Resubmissions

08-07-2024 18:48

240708-xfyamatapr 10

08-07-2024 18:25

240708-w2l9tascqp 10

Analysis

  • max time kernel
    50s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-07-2024 18:25

General

  • Target

    BloodFMx64x.exe

  • Size

    21.9MB

  • MD5

    702ab1cadcca9c85d9d3e577d28371c6

  • SHA1

    606addfb7b10515f41e61e5832fdf45abc483bee

  • SHA256

    9f8c98828eecab0beeb2f6db642a2820ba10160379663756cc7723d7df1f7de6

  • SHA512

    7f4304ff36f1a5c9302ecd67d9bc1b3b9e3e15733819d904642856d2b740b827abb8cff7368f3c99e74520bf87fc247297bf6f4b97443a4ac5100ceb9142ce79

  • SSDEEP

    393216:iu7L/sQ1DKmr2pu0tTtdQuslRl99oWOv+9ge6DRXAbejH:iCL0Q1DKmr2puI5dQuqDorvSghRwbO

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

45.74.8.132:1604

127.0.0.1:1604

Mutex

f8d99e2f-2572-4d85-92e4-cf383d156342

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    127.0.0.1

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2024-03-05T17:57:06.415874336Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    1604

  • default_group

    Default

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    f8d99e2f-2572-4d85-92e4-cf383d156342

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    45.74.8.132

  • primary_dns_server

    8.8.8.8

  • request_elevation

    false

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 49 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 33 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 5 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Runs regedit.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BloodFMx64x.exe
    "C:\Users\Admin\AppData\Local\Temp\BloodFMx64x.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Local\Temp\BLOODFMX.EXE
      "C:\Users\Admin\AppData\Local\Temp\BLOODFMX.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:3512
    • C:\Users\Admin\AppData\Local\Temp\HOME X64 BUILD.EXE
      "C:\Users\Admin\AppData\Local\Temp\HOME X64 BUILD.EXE"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious behavior: SetClipboardViewer
      • Suspicious use of AdjustPrivilegeToken
      PID:2512
    • C:\Users\Admin\AppData\Local\Temp\REGEDIT.EXE
      "C:\Users\Admin\AppData\Local\Temp\REGEDIT.EXE"
      2⤵
      • Executes dropped EXE
      • Runs regedit.exe
      • Suspicious use of WriteProcessMemory
      PID:4396
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Delete /tn NYAN /F
        3⤵
          PID:2460
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\REGEDIT.EXE" /sc minute /mo 1
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:204
        • C:\Users\Admin\AppData\Local\Temp\Client.exe
          "C:\Users\Admin\AppData\Local\Temp\Client.exe"
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Delete /tn NYAN /F
            4⤵
              PID:3652
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 1
              4⤵
              • Scheduled Task/Job: Scheduled Task
              PID:300
        • C:\Users\Admin\AppData\Local\Temp\SCHIOST.EXE
          "C:\Users\Admin\AppData\Local\Temp\SCHIOST.EXE"
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4528
          • C:\Users\Admin\AppData\Local\Temp\SCHIOST.EXE
            "C:\Users\Admin\AppData\Local\Temp\SCHIOST.EXE"
            3⤵
            • Drops startup file
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2692
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "ver"
              4⤵
                PID:4364
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "tasklist"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:4556
                • C:\Windows\system32\tasklist.exe
                  tasklist
                  5⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3052
          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE
            "C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:4428
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
          1⤵
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:668
        • C:\Windows\system32\browser_broker.exe
          C:\Windows\system32\browser_broker.exe -Embedding
          1⤵
          • Modifies Internet Explorer settings
          PID:1540
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Modifies registry class
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4756
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Drops file in Windows directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4540
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Drops file in Windows directory
          • Modifies registry class
          PID:4352
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          PID:2212
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Drops file in Windows directory
          • Modifies registry class
          PID:3524
        • C:\Users\Admin\AppData\Local\Temp\Client.exe
          C:\Users\Admin\AppData\Local\Temp\Client.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4752
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Delete /tn NYAN /F
            2⤵
              PID:4716
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 1
              2⤵
              • Scheduled Task/Job: Scheduled Task
              PID:312
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
            • Modifies registry class
            PID:4836

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BU0KRETY\edgecompatviewlist[1].xml

            Filesize

            74KB

            MD5

            d4fc49dc14f63895d997fa4940f24378

            SHA1

            3efb1437a7c5e46034147cbbc8db017c69d02c31

            SHA256

            853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

            SHA512

            cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\0L74PHG9\favicon[1].ico

            Filesize

            16KB

            MD5

            12e3dac858061d088023b2bd48e2fa96

            SHA1

            e08ce1a144eceae0c3c2ea7a9d6fbc5658f24ce5

            SHA256

            90cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21

            SHA512

            c5030c55a855e7a9e20e22f4c70bf1e0f3c558a9b7d501cfab6992ac2656ae5e41b050ccac541efa55f9603e0d349b247eb4912ee169d44044271789c719cd01

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\28V2XLEW\favicon[1].png

            Filesize

            7KB

            MD5

            9e3fe8db4c9f34d785a3064c7123a480

            SHA1

            0f77f9aa982c19665c642fa9b56b9b20c44983b6

            SHA256

            4d755ac02a070a1b4bb1b6f1c88ab493440109a8ac1e314aaced92f94cdc98e9

            SHA512

            20d8b416bd34f3d80a77305c6fcd597e9c2d92ab1db3f46ec5ac84f5cc6fb55dfcdccd03ffdc5d5de146d0add6d19064662ac3c83a852f3be8b8f650998828d1

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\m3sjth1\imagestore.dat

            Filesize

            18KB

            MD5

            d34a04a406009f759ffe580467b3f3d2

            SHA1

            47e823e71b94c240ac666ea785703e24dd9cd3ea

            SHA256

            cf41bf572a9f1eb7564791afe58aa44a95f2d68819f7b99dc83ab529096ecf74

            SHA512

            7bac9913d415c0e565b2d316189e7ab37a3ed40e5625d7a6392f495b3145c325e6062625b34d1e966e7fccdf4f29c906fe6d1edf4d40300eb97619c90a3c758a

          • C:\Users\Admin\AppData\Local\Temp\BLOODFMX.EXE

            Filesize

            202KB

            MD5

            e73a6209451022ef1697860fe3a67753

            SHA1

            98b7e9f68167a3e6d768a50c2b4610ced53d1c6d

            SHA256

            b35f2d047c35b3f0d6feefade7cd1e69d9bf25340ddbd7be937cba0ee68317a7

            SHA512

            2f61121005d1283ee37569ffb491f4de0cc882cfa95b38b1c585b0a421455b469e041d14341d0bc086638dd44c6a57486c6776f373dea441bf819cd75fda411b

          • C:\Users\Admin\AppData\Local\Temp\HOME X64 BUILD.EXE

            Filesize

            202KB

            MD5

            6048ded327cec10d49240206f6eeea39

            SHA1

            a1f4905f99654d0042e03b1eb85f190055cb5862

            SHA256

            52e993009984fb3cbd9189b44d25e24e1cc27f7042b132a6d5691a34a64ac8b9

            SHA512

            b2c77b1d2a614c75110c57e2c56d8dbe0b9db4f9b9fe6bc65eda57c3b4eadc9ce36d8a41fd65cfbeb583641837b53b33c1a95246d9a765707cbc7c8663fff3ce

          • C:\Users\Admin\AppData\Local\Temp\REGEDIT.EXE

            Filesize

            165KB

            MD5

            8853d52e63139ea98d401aedaca361dc

            SHA1

            9052fa1383930da8fe69b1d85ad06050cef0ed8e

            SHA256

            e23251179fc24709c6909763d9db607fc035fcfd38fd429c04a7f2d2d395a779

            SHA512

            3081595b34c0294525c3573ae81537b36b6cda1e5dce7af000baeea6c2a6f25adb122079117417fe48f77d010f8566222e0ae6200b8f2e1db3e8a9b5c61fa86f

          • C:\Users\Admin\AppData\Local\Temp\SCHIOST.EXE

            Filesize

            18.0MB

            MD5

            4817b3f9ced0d3aa3322b3a764fdccb5

            SHA1

            1bac5e7f5b8122fa89f595ae60dd7b4c00c86a48

            SHA256

            354c7dba94787431be1f65c97499055980ffd96acf99e2f77616150515c3e1d0

            SHA512

            dd4a4ba244ac49b3eb9540fd02c9e10f5bdf774abc0f2f7d5f180084060ee878239340a7b80e265ee6ed926d7357ff00d999ef80e936f3fc7ccfb15d08d0d639

          • C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE

            Filesize

            3.1MB

            MD5

            79e7f4a70bb7966605e64367da0d4839

            SHA1

            0f0c54bfac6933d3e7ecef5f5d40b00d7faeb1f5

            SHA256

            97c27121a07217e52d701604bf3f5ec33125fbb7cc5cff58571007f2054f775f

            SHA512

            37a9dffe3c3fe677d8ce967ec2138f3d04f6fa4ce7d3ac04bf8867e88ba5b739521cc69f37467f596626d8f08fa3ed0bf3f0556c9f2e5164189a6bc6d088523d

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\_bz2.pyd

            Filesize

            81KB

            MD5

            bbe89cf70b64f38c67b7bf23c0ea8a48

            SHA1

            44577016e9c7b463a79b966b67c3ecc868957470

            SHA256

            775fbc6e9a4c7e9710205157350f3d6141b5a9e8f44cb07b3eac38f2789c8723

            SHA512

            3ee72ba60541116bbca1a62db64074276d40ad8ed7d0ca199a9c51d65c3f0762a8ef6d0e1e9ebf04bf4efe1347f120e4bc3d502dd288339b4df646a59aad0ec1

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-console-l1-1-0.dll

            Filesize

            12KB

            MD5

            3b3c26d2247b0a2928f643fda76264b1

            SHA1

            06d8d10ea6b23f886c832df4fe1122130e71bb22

            SHA256

            258ac28b71532d6f9419edce72961e2b9644b0f92de5ce002801cc9c3caf442e

            SHA512

            5b6dfc3fb97a4a2e906739531b6d3d066d9f12eab67d5051dbb99b260a2a51e5ca19ba449b8fd901fc1034fd2402ddfa2c87fd2ac6dc3e7bdd4e929d8426a0cc

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-datetime-l1-1-0.dll

            Filesize

            11KB

            MD5

            5f1e568d0cdcf0d5d4f52fd2e8690b4a

            SHA1

            d582714273b6254249cf0bfc8ec41272eca2bc29

            SHA256

            ed94f413f576835acf4dade22ead7e764dd2f0242581090e3a2424452b49b9fe

            SHA512

            d283d739210ab29802c9df8588a5e0188dd3fd3a3061ed0aa5b5b3633e686a66ac9aa0c6fd7bfa696af7ff16da1f870b775a3a44c3a015f33a3dd83a56cfc42d

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-debug-l1-1-0.dll

            Filesize

            11KB

            MD5

            d85b98d1e5746f36e8afb027756547cf

            SHA1

            91ef9250155d7685c5730c73c1a2de361e9ba772

            SHA256

            143c8bcc6ab0d6afa1dc03996b5256a6bccb3442dc4ff3182404fde8172de4b6

            SHA512

            6d1b507613ce85dedddb5d61a0ea3b926b79443c5688fe0ce9283ffae7ff27af93c418ec3b086f3a84e574afcc3a1170d0ab1d8b4d5976a71af79bbd351d7caa

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-errorhandling-l1-1-0.dll

            Filesize

            11KB

            MD5

            1ca45137e611548c8d090ebaa178d462

            SHA1

            ee84cb3d6ad1e6180a6825d9d293e7c9418c7153

            SHA256

            3c186afd5cf0e4314d0e15bd55832e976368d162331d5cb065fe890b88c9cfbd

            SHA512

            139349c90590d17a73d0dca3bcb72febaea1a8cf2a4da24716dcfbaacdf6c85260c5e792bb04f923975e918163a46524ebeed1f2f02494d9f271d73f8b558bb8

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-file-l1-1-0.dll

            Filesize

            15KB

            MD5

            eb5e7affe24ab532089733f8b708a1ff

            SHA1

            f3b1f20d29d8b38d8c47cf66c75d650c5b855738

            SHA256

            17ad72adbef247080dd456bb54f11bc782801381fc2aa2abe005cca9db6254c0

            SHA512

            69c148749f9b1729187c3d39d2d00ba952d22163ae393716b2096a869a97ead4cfed8edde303cc65c13cb30d6e44fcb2e4cb896b03dc14aac7cb49958a23e699

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-file-l1-2-0.dll

            Filesize

            11KB

            MD5

            a8b0327931fd2c863693634b3081e6a0

            SHA1

            d66cd78c124e931667b6079d5bc5adf55a644293

            SHA256

            1fa836b3704b29e7ad1ea1b0b457f62aae4435c6a1d745707631552a2f83d5f6

            SHA512

            1b8331ac9b17d3553a5c7b4572f826bb232b339c28f6c9a31a870097c7612587cd1dbe59fe294501ce11cf5bba973d83784108309617b6f7104f2aae8f723961

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-file-l2-1-0.dll

            Filesize

            11KB

            MD5

            eb4c279c8386d4f30aab6d76feec3e5a

            SHA1

            0c611e8f56591f64841b846df7d5c07fd75b55a4

            SHA256

            56bc7d3dd48d9cb209195f71be67d0a90ca929a8d4e6ae5a481f3ab0345da294

            SHA512

            1869b0c843df05ba849e79aa15b25855aa5c2c2e5a932c0de650b83c8abe2371585731b0213061b8f4d781a87b352ad3a09bf8555fcf0f9422a0bcc1a9062781

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-handle-l1-1-0.dll

            Filesize

            11KB

            MD5

            cef770449597ee64eed064e5edf3f76b

            SHA1

            f759143f09f539e032a680b376f7362610215fe3

            SHA256

            2b52bf5a8c0bc2e93cebcce597c6693a118667e9f16836e65d8b166d33d33f49

            SHA512

            f899e00ae697c44c8b127dab548c25181e2772a9cb80e6887ed2435be7a03a51d2e77820456e984921b0252d77f0fecb7b1c5b08615b49e3c08d531a09c67279

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-heap-l1-1-0.dll

            Filesize

            11KB

            MD5

            2143036c7d2ba3cc75ecbc66f60d5259

            SHA1

            dd9192d9b4c7e90290796431db0ef8cc06210c73

            SHA256

            c8adf90a32936eaf678ed9a091d422e091e6b80d0431ec120e60febe1f617ac3

            SHA512

            94e4618b574924ae48386dfd520de6faf2ba1a3347fa56ded559bcf24f0e14bf1a7f442bdfa68244af5294fd83e8e334d7cc4959c14434665d731c9d5beadeb3

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-interlocked-l1-1-0.dll

            Filesize

            11KB

            MD5

            47e43806d67d182ab20e77fd2b705cdc

            SHA1

            bf7f4ffcaac83535146d372767db6f36bad3bb61

            SHA256

            52df3c5ded71786cf0f4f7545d59f5e6e168e6a499862c59b5985f6071f201ab

            SHA512

            28ea9b227b42e86ea7e16eabde3f6b01a86da21ca50119b173e98e736e4997a81f9ee20f7c11e5fdfe3c62255345c078bd9d9e51bd6b45911b14f90b0ed7b76d

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-libraryloader-l1-1-0.dll

            Filesize

            12KB

            MD5

            7672f7af6df502bda30f98005487e24c

            SHA1

            d49003f56bd5d19ff265dab88fcf9d1bbd145a31

            SHA256

            52a11ca57d562ee1cfbb7d6c26253cbd67a39b55bf1a56cd0f9332136986e8cc

            SHA512

            0ee52bf600f70e16006ab159d4b3ea50241941fe9dc8031a78c8f0797374f6ae221ecb4be9789ae0b29fc1b8313951a79886b44b51cb6387e79059acc2e1e3c0

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-localization-l1-2-0.dll

            Filesize

            14KB

            MD5

            a94626cbc9c0e1b62619a8cf49504ff8

            SHA1

            047e2b1f21f1258242238043143f1d892538bbc3

            SHA256

            a36792281c0aaab929635bb1f40ee3627225e7e35e6a199c188f3f782c7e6c27

            SHA512

            b208602f33f02c92df718e4c009e6e8055e538c9451ef6f9682ce21db5258d799c09f689aae2879470a934b60b4f3d44ea82704933fa40f2ff408cf42bd1c534

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-memory-l1-1-0.dll

            Filesize

            11KB

            MD5

            130b06c83791d63b703d54291b69c789

            SHA1

            314e29b408a93343fa8e0666eb0d128e8e2f83ac

            SHA256

            bbf2556eff6f0bc6a11d73821aca2c14d5c8235143ceeb16b55b47eee453f179

            SHA512

            46a513a466a43ed1581a4406795bcf79576e731fc486d0b055be2f75cd6b9e5f6221bc76873941b8c8418ebae4aaacd7f689c3a01b2f42d89beca55406184837

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-namedpipe-l1-1-0.dll

            Filesize

            11KB

            MD5

            ead87c06066422461368fa5dc07be9c0

            SHA1

            3009d09b9727df50e586217e98edcda9f46a7b30

            SHA256

            b39d21f236d903c34770d50da02c14e8d226e695138f3f6ace4eae11b6d6796d

            SHA512

            4f1eabc514b18b5704f90f87a7d0231ce47e9125c7f490570699519d5ee70cdfbba067ab67c6d9878a86129181367e55fada55a377efc6873afccc40763459ea

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-processenvironment-l1-1-0.dll

            Filesize

            12KB

            MD5

            585c47a83cb7b3a69d23b840dc56ee6e

            SHA1

            b75739a142d1cdeae815404e10d7ef28230451db

            SHA256

            3fa37c4d72451e968217c20ec64a01f5d4f1a5af7b44a107607cad3d3618aee1

            SHA512

            ef76ace5b820fabfa142ab67f6ad2c68ef29fd95ed1b8d0d0d31759b18b3b218675ae5d7a45b533a4784629adc8c394fb6b0d2689e926700e7bf04f833673f45

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-processthreads-l1-1-0.dll

            Filesize

            13KB

            MD5

            e345e6656aeac37c80a404f032ba550b

            SHA1

            371eaeeb74227dd2e7b1bcf36e7aa2cde446a0aa

            SHA256

            31fd144dc063f7fac651147f0c3826fb0b33ca8028bd4f70a78d63cfb53d81a8

            SHA512

            6af30635d25ba9552498e78ef3332b60e03d070d6e503903145c8ae30930efeda75b687082cf46c0c25590d6459463f8d873f3e5176bafc9194156d8aaeaa045

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-processthreads-l1-1-1.dll

            Filesize

            12KB

            MD5

            b16e6798ad40000698a09276961fc2c3

            SHA1

            b5184d9bdb1f5e7cfe17b2ec305c8554362067de

            SHA256

            f8b7122ca5e1d473818940fea4d1155af429463038ba61953908fbbbb7a8d613

            SHA512

            a4737a2236eb35e1b4935a5e333c7f1c51588852a8daf654fd2e7ca6e945e40df9d001394c2f3e3a9d023b8d4e34e9753f6472ed58df245b104623d7dbde7423

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-profile-l1-1-0.dll

            Filesize

            10KB

            MD5

            c06f8f8eed1581ffee9efd5fdbc44f5a

            SHA1

            b44aa8d6ab3a713c07bb68cbc153c78c634aebe8

            SHA256

            8b36bce1b7a881f85529eae56e5b75e32763eb14b6683f2203a957ec31336ce1

            SHA512

            13d369d61a953f92cb1a5935d8e69ec050d7291f8c83ffd09752112bfebcce8b8ae99fc168e969b00141816a1c6c3a981340cfaca319d4f7b188e3a20a43f950

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-rtlsupport-l1-1-0.dll

            Filesize

            11KB

            MD5

            1f79f843211cdbf6f109bc2e1eca522f

            SHA1

            b4a7a607e3eb04fb616d885768ec729273ec33ea

            SHA256

            5208000a52363b1de665d5d46cd6f4da45f0c19c74876918e165e23efed26e92

            SHA512

            4ac7797b2e84d2fade089bd6f4b44103eecd1369e47440f1abad3f06cfc2ea5408b8692af63b81769703898cef87068a1e8998efb91b13e60a93325e72dbdc39

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-string-l1-1-0.dll

            Filesize

            11KB

            MD5

            6fc55f288e6124935beefdb24f98e4d6

            SHA1

            e9cff87ba41b04eaac6f7bbbdfdcb671857a2eb3

            SHA256

            6bf3e8a6cdb3ccaa52f05fa336bbe80e70351a3eb0c8a98ef599b596d11aaee5

            SHA512

            a675d0f195774ebe7e118d12932af97f15ebb982f7981552216aefc18b918934c863dd9cc35a67761ffb0dab6791f0363808256b2e708d2f93a5800c42475dd2

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-synch-l1-1-0.dll

            Filesize

            13KB

            MD5

            9c69b176fdb21f68fbb36aedf237a18f

            SHA1

            aa25e9565d6fa887135318ab8c384180b575d916

            SHA256

            b48b10bfeda8c32e538b03a9db05864866f8a44d04824f63032f2dc33e39fa1b

            SHA512

            f34c0fe7b29f7c475d663e12dff71a9a93d76914072c69abca54e6780a81894e35d9650e855fd4be5485747dc4a24ed10cb658688432900a0ffe6489d622c1f3

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-synch-l1-2-0.dll

            Filesize

            11KB

            MD5

            2d7db8919ceb847377e4c40c1ec7b842

            SHA1

            27371e9e311c7b8edc56084e41c25e7a87c7c265

            SHA256

            d3e6256c2dd7150cff8ffca9c9cc6ef477c1da72c0d32972d1022381927b8295

            SHA512

            b634c27cd0f50748c66f256e316d6aace23d358cbd9aedbab2a0bba9b1a77587422d77c6d161d129a57ca34dfb11507486e1cfbcb6d4ac9779c7a2989f3a29c9

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-sysinfo-l1-1-0.dll

            Filesize

            12KB

            MD5

            44208a7738486bf56121c752df083658

            SHA1

            93665af04ce345174df47d7b39aac68327dd13a4

            SHA256

            85b8a6d64a66556f4501aaf120d699dba661841027d27becc6d7240dafb14138

            SHA512

            38680a4329da0ba501dd78a9005b3e8b54f1dec9fc8dbc08b969e70ebe480dc2444d3c4e66634b14e0e032573240524333e019e4b2c750d8dec1a9dd7b7632c9

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-timezone-l1-1-0.dll

            Filesize

            11KB

            MD5

            f0f891d08e0e358327b323b38f3ffca2

            SHA1

            eb20f147c53f86c59603f5edbf60f936f768fb1b

            SHA256

            9c8461929b61e0fd269ce735d699e7e3b6c0159d3e2659f60d681290abf9eac5

            SHA512

            94e13c4d09ff35c2ded7fd2649b3542aade1414f05772e2034af7723f2622e662e8c0bb67e1eb288e230f8ae183d8f1296c2a134b7ae061a452fa3f7423d7694

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-core-util-l1-1-0.dll

            Filesize

            11KB

            MD5

            1417705c75240630943aaedd35a4b406

            SHA1

            74047910e023f6ab2ac5242c47147c1cb47a7d48

            SHA256

            76748b18c61fac93fe1c0587711e3ec0b306b2c92198f0b8b4f6bad8c6d9ba8f

            SHA512

            918987aa8e72b6875d0c1c53cc3521757eda25c746ae477fea545428be5da692fae60aac665dc15c3af89bad43e491a72d00302beb349f45e35e7c89217deea0

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-crt-conio-l1-1-0.dll

            Filesize

            12KB

            MD5

            184a6a9df3526464a3a5f2dc1c21e55b

            SHA1

            33101ece94c15d733d985fc71ddb13ba4b70b9c7

            SHA256

            25bbdabc7b8d8edf5cd05b5591edca13236724cad1011393e010df3c58fd6f7e

            SHA512

            2c2162dbd2e36d81054feb064ea6850547dab270b95faa3dc878a11e47a9c0558ae2039cbb3bb3d1974c1582117d0f3022512a340241da5dbacfd5f94f713f75

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-crt-convert-l1-1-0.dll

            Filesize

            15KB

            MD5

            dad955bbd1a073f1920bdacc7e9d4b32

            SHA1

            1ce733a4450d5426a78ef2bd1cdbe5d5ff958fd0

            SHA256

            fe368e5edf476436afea571faacf80d5d12a4b064d5736ee482b972eee82a64c

            SHA512

            294e838dc41f97afeecb90b58df5fd5449ff1582cb80185d7efe7cadf354ef9f0a1e374c50bca5f72f1859d88a832330caaa9d7a25e1da49195530f0ec26a06e

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-crt-environment-l1-1-0.dll

            Filesize

            11KB

            MD5

            36a4f9af7c7d93c49c973da11475d81e

            SHA1

            8167f90ee36a9c24c53ce78bac9427b8dafdd5d5

            SHA256

            29656b4f4f985952c5edee8e66ad7901e47c3c5619965dddc9939c5ce5ab7d58

            SHA512

            92449c67dba558b54c71c88bbfee5a245078238642fdd5368b1d0f41439dfb62fa9292b4fe00162605dbe3d14c8847c3bde4f14c1f06f5271d6392c81278d74a

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-crt-filesystem-l1-1-0.dll

            Filesize

            13KB

            MD5

            f6c3b0cd6c578f544e94d75d9c9ffaec

            SHA1

            1b4b1babda538e23cbf2bc458303d7ae70741347

            SHA256

            6e65f088e4ecb0cf8306766c59190ce3efbc8a190fcbb53572cc61e35d2787f1

            SHA512

            0dfcfe028970dd70653b3dfecac4ac5672a3b5c6aae0252ca54a1226e19c4cd2bad5b32eb6ff75765cf82cd82ad986d95aef6d12e3a4a291baf6615cb6e96356

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-crt-heap-l1-1-0.dll

            Filesize

            12KB

            MD5

            6d8959da747b68298f6d8f81cf23c077

            SHA1

            e7c7b64ef5e5faa0da00430a81dd85765661649c

            SHA256

            1bc96d86e373fcb77e3d2e48440f0eafb7e42a88a5a82e0ace01967acf236d3b

            SHA512

            0838c8adcea9127bb1f39a70d07ac7bde0ea23c4fd8f418517aef72f590c3f644e9fd7a1a571231e7d47311e66cca1f71187337e634c1e3fdbf8e0d0016b112b

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-crt-locale-l1-1-0.dll

            Filesize

            11KB

            MD5

            dd5fc38ed969ff4b3aca435c70eb2132

            SHA1

            becb1d7b94d4d99222cdd4c4c7472f0448c3a65c

            SHA256

            69e5f222dc622555c88e3bc4cfef42f64237728bd02d00c9281203e512ca77b2

            SHA512

            4680d5ff8d40bf58b6e1bd3a8bcef7caf9f0b652993faa22958d0315e259acf2177fe8e3e579065641bddd4bfc8eea34f47aca63ac8b07a56de7c952adeafd5d

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-crt-math-l1-1-0.dll

            Filesize

            20KB

            MD5

            5f6c4318712ef0c644d39c088b660ebd

            SHA1

            44b166918cb8208bec51ff46ddbaa49cf023fbd1

            SHA256

            e4244f90307ab003cb5cc9bcd729ef897abcf26785df9277cbe389e328e0fe0b

            SHA512

            ad272ece4c4fd3f8362d8ff91d3c3e738e2df8281c319744d7d72792f203ac40cd0c4082550815690036320756b57ed8e51c9efb01ed4c2fe01138b98f9deba1

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-crt-multibyte-l1-1-0.dll

            Filesize

            19KB

            MD5

            4b189d01eddd9c21d2e56caba7b6cf50

            SHA1

            05dc00b2c5e8c85d9f4f339d4c83f0dbebac060f

            SHA256

            996b63255e2f1e366f520a6d09352d2829e92f6b34f2d98448c4fd33ae4c06d1

            SHA512

            70506b16c25a710defa47548c60a0ac4e6978ea8bc24472e0726d98c5754b8293fd60622d7798639bcdb878b035d468b799a2c9eb03d8b87828e7c8c08832731

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\api-ms-win-crt-process-l1-1-0.dll

            Filesize

            12KB

            MD5

            0ad8330a78941c63f4fed28440163005

            SHA1

            47a73d254ecd71273f71bfb67ca43dbd974d3791

            SHA256

            0dbe94bdfb49ba93ccd7db40323b824b4f1941cd340916d73ba2241a7d34fc1e

            SHA512

            bdfa386b2a5c3b31f29592e6c76e6e36a4489aeb2edb8d713d6dec99fbd3bb6cd97195fe81ab30bdfb2e26bbb57102c25961739734035c482227f40bad585a1f

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\base_library.zip

            Filesize

            859KB

            MD5

            6d649e03da81ff46a818ab6ee74e27e2

            SHA1

            90abc7195d2d98bac836dcc05daab68747770a49

            SHA256

            afede0c40e05ce5a50ff541b074d878b07753b7c1b21d15f69d17f66101ba8fd

            SHA512

            e39621c9a63c9c72616ae1f960e928ad4e7bad57bfb5172b296a7cc49e8b8e873be44247a475e7e1ded6bc7e17aa351397cdeb40841258e75193586f4649d737

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\libffi-7.dll

            Filesize

            32KB

            MD5

            eef7981412be8ea459064d3090f4b3aa

            SHA1

            c60da4830ce27afc234b3c3014c583f7f0a5a925

            SHA256

            f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

            SHA512

            dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\python310.dll

            Filesize

            4.3MB

            MD5

            deaf0c0cc3369363b800d2e8e756a402

            SHA1

            3085778735dd8badad4e39df688139f4eed5f954

            SHA256

            156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d

            SHA512

            5cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989

          • C:\Users\Admin\AppData\Local\Temp\_MEI45282\ucrtbase.dll

            Filesize

            1011KB

            MD5

            7e39d82adf5da0b51a968c764e0e15c1

            SHA1

            79e75ccde95798f21a34e5650b29dbebe79c1b43

            SHA256

            d67926328a72816d2944d7c88df6ff4bfccd41a9ce39af0309a0639829d0e7fb

            SHA512

            1c58d53c40535f80f482a5f406ef5bf9c2f963b9db5969c37ef47b0c59522a1a9bde3f3589538a7ae7d99d567a43170b384761e572c740010feb86894ce7322a

          • \Users\Admin\AppData\Local\Temp\_MEI45282\VCRUNTIME140.dll

            Filesize

            106KB

            MD5

            870fea4e961e2fbd00110d3783e529be

            SHA1

            a948e65c6f73d7da4ffde4e8533c098a00cc7311

            SHA256

            76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644

            SHA512

            0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

          • \Users\Admin\AppData\Local\Temp\_MEI45282\_ctypes.pyd

            Filesize

            119KB

            MD5

            ca4cef051737b0e4e56b7d597238df94

            SHA1

            583df3f7ecade0252fdff608eb969439956f5c4a

            SHA256

            e60a2b100c4fa50b0b144cf825fe3cde21a8b7b60b92bfc326cb39573ce96b2b

            SHA512

            17103d6b5fa84156055e60f9e5756ffc31584cdb6274c686a136291c58ba0be00238d501f8acc1f1ca7e1a1fadcb0c7fefddcb98cedb9dd04325314f7e905df3

          • \Users\Admin\AppData\Local\Temp\_MEI45282\_lzma.pyd

            Filesize

            153KB

            MD5

            0a94c9f3d7728cf96326db3ab3646d40

            SHA1

            8081df1dca4a8520604e134672c4be79eb202d14

            SHA256

            0a70e8546fa6038029f2a3764e721ceebea415818e5f0df6b90d6a40788c3b31

            SHA512

            6f047f3bdaead121018623f52a35f7e8b38c58d3a9cb672e8056a5274d02395188975de08cabae948e2cc2c1ca01c74ca7bc1b82e2c23d652e952f3745491087

          • \Users\Admin\AppData\Local\Temp\_MEI45282\python3.dll

            Filesize

            63KB

            MD5

            c17b7a4b853827f538576f4c3521c653

            SHA1

            6115047d02fbbad4ff32afb4ebd439f5d529485a

            SHA256

            d21e60f3dfbf2bab0cc8a06656721fa3347f026df10297674fc635ebf9559a68

            SHA512

            8e08e702d69df6840781d174c4565e14a28022b40f650fda88d60172be2d4ffd96a3e9426d20718c54072ca0da27e0455cc0394c098b75e062a27559234a3df7

          • memory/668-451-0x000002A236ED0000-0x000002A236ED1000-memory.dmp

            Filesize

            4KB

          • memory/668-450-0x000002A236EC0000-0x000002A236EC1000-memory.dmp

            Filesize

            4KB

          • memory/668-464-0x000002A237600000-0x000002A237691000-memory.dmp

            Filesize

            580KB

          • memory/668-251-0x000002A230820000-0x000002A230830000-memory.dmp

            Filesize

            64KB

          • memory/668-270-0x000002A22DDA0000-0x000002A22DDA2000-memory.dmp

            Filesize

            8KB

          • memory/2512-17-0x0000000001210000-0x0000000001220000-memory.dmp

            Filesize

            64KB

          • memory/3524-646-0x00000231C7F80000-0x00000231C8011000-memory.dmp

            Filesize

            580KB

          • memory/4352-377-0x0000027C53D40000-0x0000027C53E40000-memory.dmp

            Filesize

            1024KB

          • memory/4352-385-0x0000027C54BC0000-0x0000027C54BE0000-memory.dmp

            Filesize

            128KB

          • memory/4352-425-0x0000027C54A20000-0x0000027C54A22000-memory.dmp

            Filesize

            8KB

          • memory/4352-423-0x0000027C54A00000-0x0000027C54A02000-memory.dmp

            Filesize

            8KB

          • memory/4352-427-0x0000027C55010000-0x0000027C55012000-memory.dmp

            Filesize

            8KB

          • memory/4352-442-0x0000027C530E0000-0x0000027C531E0000-memory.dmp

            Filesize

            1024KB

          • memory/4352-306-0x0000027C52C40000-0x0000027C52C42000-memory.dmp

            Filesize

            8KB

          • memory/4352-411-0x0000027C55B00000-0x0000027C55C00000-memory.dmp

            Filesize

            1024KB

          • memory/4352-303-0x0000027C42A00000-0x0000027C42B00000-memory.dmp

            Filesize

            1024KB

          • memory/4352-343-0x0000027C53800000-0x0000027C53900000-memory.dmp

            Filesize

            1024KB

          • memory/4352-309-0x0000027C52C70000-0x0000027C52C72000-memory.dmp

            Filesize

            8KB

          • memory/4352-470-0x0000027C42500000-0x0000027C42591000-memory.dmp

            Filesize

            580KB

          • memory/4352-311-0x0000027C52D30000-0x0000027C52D32000-memory.dmp

            Filesize

            8KB

          • memory/4396-18-0x00000000021A0000-0x00000000021B0000-memory.dmp

            Filesize

            64KB

          • memory/4540-280-0x0000019153300000-0x0000019153400000-memory.dmp

            Filesize

            1024KB