Analysis

  • max time kernel
    106s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2024 23:08

General

  • Target

    e7f73cd85c248746ce404a8704ee0730N.exe

  • Size

    62KB

  • MD5

    e7f73cd85c248746ce404a8704ee0730

  • SHA1

    34ca52c579509b0c58d7364f7c769992ecab7e13

  • SHA256

    c2c01ffcba12802f0f88c360330b8e6777c14d532adc7ad5bf9fd97e4e5b750f

  • SHA512

    d753533d69a82356f28cb691e2efb23e0654da03733c3f913b56bdd3abc50ee76234086f18652b5ff9ab81b912b712fcdcf02f5ddba2993e272aa2839cf09260

  • SSDEEP

    1536:sUjzZPICovzaM2WHpzaqXw01R1Q2BZ5b+hPPA2ivy9ve8Cy:r3ZPIC6z0Eaqg0P1QaZ5b+Nagve8

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 36 IoCs
  • Executes dropped EXE 18 IoCs
  • Drops file in System32 directory 54 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 57 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7f73cd85c248746ce404a8704ee0730N.exe
    "C:\Users\Admin\AppData\Local\Temp\e7f73cd85c248746ce404a8704ee0730N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Windows\SysWOW64\Ddjejl32.exe
      C:\Windows\system32\Ddjejl32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Windows\SysWOW64\Dfiafg32.exe
        C:\Windows\system32\Dfiafg32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Windows\SysWOW64\Dopigd32.exe
          C:\Windows\system32\Dopigd32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4380
          • C:\Windows\SysWOW64\Dmcibama.exe
            C:\Windows\system32\Dmcibama.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:704
            • C:\Windows\SysWOW64\Ddmaok32.exe
              C:\Windows\system32\Ddmaok32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:960
              • C:\Windows\SysWOW64\Dhhnpjmh.exe
                C:\Windows\system32\Dhhnpjmh.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:3288
                • C:\Windows\SysWOW64\Dobfld32.exe
                  C:\Windows\system32\Dobfld32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4756
                  • C:\Windows\SysWOW64\Daqbip32.exe
                    C:\Windows\system32\Daqbip32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:3000
                    • C:\Windows\SysWOW64\Ddonekbl.exe
                      C:\Windows\system32\Ddonekbl.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:3276
                      • C:\Windows\SysWOW64\Dhkjej32.exe
                        C:\Windows\system32\Dhkjej32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:2380
                        • C:\Windows\SysWOW64\Dkifae32.exe
                          C:\Windows\system32\Dkifae32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:2868
                          • C:\Windows\SysWOW64\Dmgbnq32.exe
                            C:\Windows\system32\Dmgbnq32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4032
                            • C:\Windows\SysWOW64\Deokon32.exe
                              C:\Windows\system32\Deokon32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:5024
                              • C:\Windows\SysWOW64\Dfpgffpm.exe
                                C:\Windows\system32\Dfpgffpm.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:1880
                                • C:\Windows\SysWOW64\Dogogcpo.exe
                                  C:\Windows\system32\Dogogcpo.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:5044
                                  • C:\Windows\SysWOW64\Dddhpjof.exe
                                    C:\Windows\system32\Dddhpjof.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:1688
                                    • C:\Windows\SysWOW64\Dgbdlf32.exe
                                      C:\Windows\system32\Dgbdlf32.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:3748
                                      • C:\Windows\SysWOW64\Dmllipeg.exe
                                        C:\Windows\system32\Dmllipeg.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:1900
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 396
                                          20⤵
                                          • Program crash
                                          PID:4212
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1900 -ip 1900
    1⤵
      PID:1048

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Daqbip32.exe

      Filesize

      62KB

      MD5

      912b7f9f2885fb5f3dd5e54e66880698

      SHA1

      1973e490fe194296e0078f8c34cc444c5e1f79c8

      SHA256

      bec220bbf22074a30964e82ff4cf70aa63e3d123cd744d486007a4bf85b2127f

      SHA512

      9508fbb8cdd4cf4e556955e959dfd8245caaa32995fdc0fb6a7c3610c72a13e87ec365c0f78eee2d6cd133f93526a79c981b61d054eaa94c64412f4c7cf5b343

    • C:\Windows\SysWOW64\Dddhpjof.exe

      Filesize

      62KB

      MD5

      5406890bf0701a05e01b20264ab83cb8

      SHA1

      c2d75c0c7d3db04339e531bb1d2c56be5382ede6

      SHA256

      a8e03c7e6cc67c515108a333d625011cc01e6bb68f4870e4ee0c02b1e3215b80

      SHA512

      2ed3b0bbf4d1f9bdd69280b9c8ed9e3516e7a5862748aa15d0727310b3551b7ac130bd0305ab0bcb0e54e559b4961be8406d3c1bd7e044bbe8851fd94d5edc8c

    • C:\Windows\SysWOW64\Ddjejl32.exe

      Filesize

      62KB

      MD5

      4dd724070e12d2310301770b57764104

      SHA1

      94f51304236188349fa1808731e38017bc99434a

      SHA256

      d3e163b294cca7ff34d624be9d9df6dcefd1bf9732edc9d589be100b87c3278c

      SHA512

      d4d1c6cfd4bfcf52618b2656788bc1d810a34dc78b39c4e38eb4952305126d0a746b435d9d653673a811a16238d0aa6a271c7ef361b8078be08914087a7f7967

    • C:\Windows\SysWOW64\Ddmaok32.exe

      Filesize

      62KB

      MD5

      5bcaf7d6adc78dc8650449789b228c6b

      SHA1

      ca61fc2a5679b8af3f94fcc5165d03c999a27dd1

      SHA256

      6f09b0354b0bde91c7fe23ea7fa1eab08c215cb980fe482f9a65915551319b66

      SHA512

      01f6a7e491cd4b461148c953c3116beeecf22ab7c5e5375590bbd1bbfaad0a6246aeb0ddb38ef7a6a51b310a72af3a4188c6a9410f2aa9660b7adc6fac1a3ba1

    • C:\Windows\SysWOW64\Ddonekbl.exe

      Filesize

      62KB

      MD5

      de90d844e3f67feabd2327a9fa74d483

      SHA1

      03c0329663a9fccb49304a68419813e6992f9fb3

      SHA256

      c8d8d6afed80d20557bcf1e439d3f9ae2d5514a16cff60762a5767fdfc29b921

      SHA512

      886ea2aee65ee3af2a7dccc311861fbf50f701cbb530b5dc78e1ed0d2b2cd825d358444c2ab9ed1be713f5d8b83a8a70e5c8fe20a48071d17ab603205efbf41b

    • C:\Windows\SysWOW64\Deokon32.exe

      Filesize

      62KB

      MD5

      ad5a692a5c8fa6c05f1397ebeefc7de5

      SHA1

      9a98ffa90a9eb474506bae6b54fb6ab1d3ce2666

      SHA256

      99ea17979cd31803d330f3e31a0579fa080e4f9eecc23a750e3af206f66ed29c

      SHA512

      1dbbd3f83861cbee6ab5eeb2fc7a0e97d7709e140383ef4db64dc2e1362e3cefa0bb2a7aa3e0c6cfb60f112367019993ff911ccb23043e7f615a523b3fe2059a

    • C:\Windows\SysWOW64\Dfiafg32.exe

      Filesize

      62KB

      MD5

      0b9c6b03f30090556d7959a19a59a07e

      SHA1

      33f6a92eaaaa75e44da9f06ed3e5ddbc4c427847

      SHA256

      ea39fa0878339bb9acad254ad33f1fee99c0125d7114d5a040e84a109e409066

      SHA512

      20cbd7f45ab71fe9481113474ede220835dc9c19a25820c10af372ca4536fc979bd1d4cf8733e32179ce837ed74a891060f461e29c7dc3ab20dad81931a8994f

    • C:\Windows\SysWOW64\Dfpgffpm.exe

      Filesize

      62KB

      MD5

      9bba8aa042b33ab1d1aed2b0ac463d7b

      SHA1

      58ae429ada2e248766d87581fd1672ff351a74a7

      SHA256

      27624efc72f364a6554a2209b0d3c6e243f7667ef92b37f0e4c2d8f4d2af4145

      SHA512

      8bc0391e41332425da5071cd87f4e01c381450639dc4a1f9b84c7ca99ce30fbfb47cf9e31ed2833be0b11fab3deac782741213ea517fe3a526fec04e085c28b2

    • C:\Windows\SysWOW64\Dgbdlf32.exe

      Filesize

      62KB

      MD5

      ba17ffa47539a8a92729268de9ca97e4

      SHA1

      088594f625e544d2b7d7389718355ccadd30b069

      SHA256

      91203dfa41a86e5d7a7711340ebfd59f1c5f237c5cdbd12b22dcd9e8d92f41f3

      SHA512

      720273d9065b018424384b1c8133a1f8709fd41df5ddcfa2943f2d2103904f64e1a8451eb37cdc6a39e9ddf9dd553c48dda9a5b5c393ad05faad0ab98bc81d66

    • C:\Windows\SysWOW64\Dhhnpjmh.exe

      Filesize

      62KB

      MD5

      4be6eb01785ddcd928e11383e00daeee

      SHA1

      79646a87c5b607474c0b627cc836273ee2b1fed4

      SHA256

      6ef2d43ff5421c8067b144587f1a707c1ad29f1c16641790ddddec49fd05515e

      SHA512

      a561330920525d738a8586562fe1852ff26037513c53ac4fc5b1399f5a25a61d8d4bd5737205cdd5b78c15ea6e12447c18f0b7ed69bfce906b6bfb82544c6a9f

    • C:\Windows\SysWOW64\Dhkjej32.exe

      Filesize

      62KB

      MD5

      ddfedf2156dd8ccddb5087e3fa8704be

      SHA1

      6606268325c64778256a2304b8f216185001f3ec

      SHA256

      22a75d3c309c71071717d52d237212edb1d8a8ed8030d4279aa140c011d11d39

      SHA512

      90e7ffe4e20cff796f1cd2bca63e7b3f010578454e32bc36d572049e0deed7c60397c7484b1173ee2fd3a395a3b189e4f3f08b4d4dceeedd172f50c60fd85840

    • C:\Windows\SysWOW64\Dkifae32.exe

      Filesize

      62KB

      MD5

      570880e1ec7ac1c96406de21f0af1a84

      SHA1

      9d811b5d478f05c1e14aaeb1a5e23c7e45e1d621

      SHA256

      5f3db909e5a300afb2e14ce86ae633c6185f5030b6d7dece0af2b89bd8826379

      SHA512

      90a465e5fc477d0cca81c0d411c1ac4ea4c78a963be65769f6a4dfdf9b15293031dc564a4920a8bfaaf676e6cd2624f6695f12cfd10c2c033782cff95da74be7

    • C:\Windows\SysWOW64\Dmcibama.exe

      Filesize

      62KB

      MD5

      9564b74e84fb157598d7709d4a59c7d2

      SHA1

      c5e0182cb2bfce53ad0e659ff49e83d5b9e1409d

      SHA256

      e0508d56726bfbe9a6b40c953a29cb7268bd2076c3d0f45e6784e5786b637ab1

      SHA512

      b5ad5584867a371abe9fec47f0eaaebb5a84e75ddfe9938f2e3deca90b2619a6a53824899569a37e83a3cb40b6137d02a384053924ca655b5fed03a67659d82d

    • C:\Windows\SysWOW64\Dmgbnq32.exe

      Filesize

      62KB

      MD5

      ffec4620ec958da7ba7ef6251a92b7b5

      SHA1

      eae1402b5e152a754207810de1ce5fc4fed74fa8

      SHA256

      14111ad0fb45e3078a03a4e6275a69daf0dfa8a28fd4dac6db6dcea49963ebb1

      SHA512

      4762a012ad4dd519fff33f27a93e32b092c4e1266bc212b79cd57a2e9b85e5e68d51ff9ae60c5b21d58152b57a199a4a14e5d1d3a5ebdb36803476b54bd6e6b7

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      62KB

      MD5

      5a96e6e8e4ba173a196fa36a299a4385

      SHA1

      c2d1b8b884ca7bf589c1e46e21d2c8218c1a9ad3

      SHA256

      188f584049ce8d542b8eda3bdeefe57813eeabd799e2cfc037f4c59e69d76841

      SHA512

      18fff2a37db15da5dc30996b76f700bd59928bb5e68c971b9b507d35f10a0d78f06a0bd624a7f04c0d1682d997267fe82758c567a277225cca7ec292220cf824

    • C:\Windows\SysWOW64\Dobfld32.exe

      Filesize

      62KB

      MD5

      c499dd479c5a9fec088cf4fc2ba5b1f3

      SHA1

      15809dab1f22ea74170b314989d0871fc7ebaa1e

      SHA256

      7a4281e8d20baf4fade14ae9d65e7dadef361dd59848460349668408b60f5f0c

      SHA512

      887d979e8fda714f0d15ff4c16e495183ac3ad099489bb272d0ec30833906030ec8603d23070451b3ab5d90e441e476b5937201c389cbb0b6a66758eb15bf0d9

    • C:\Windows\SysWOW64\Dogogcpo.exe

      Filesize

      62KB

      MD5

      fbaa170b1bebf1bce7c0f6e85826c739

      SHA1

      955c9ceea35b46c92902b59ecd3cb258cae45249

      SHA256

      56282e0be111b15734838a2ca19c049f01c6a326085ed7c08177672608807269

      SHA512

      cae8acc3381cf7ef61017585d13a24548b72653c46d8070a71565b4865d8299eb8e69ca808342748745301af1b46169c85245adf274bd1dd728652768ef0159f

    • C:\Windows\SysWOW64\Dopigd32.exe

      Filesize

      62KB

      MD5

      532e748ab5b403997cfe4052dc20c15a

      SHA1

      da25cb815f3fd4147b135e1fcaad4ea7f9d6463c

      SHA256

      44ac7b4826339f0901f40f4c23510287e7fb5c69e0cee7dbff8b504d9b6e2698

      SHA512

      272789311fe22018cacd20688af3e186aa737356a6f0b8d1b2edb5008d3835f9c382657c6d3d7ea230f6bb270cf13c3b060624e0d8ea9347948deb2a2970ae15

    • memory/704-117-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/704-32-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/960-126-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/960-40-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1688-140-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1688-157-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1840-9-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1840-89-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1880-159-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1880-118-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1900-153-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1900-155-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1912-98-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1912-17-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/2380-164-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/2380-82-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/2868-90-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/2868-163-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/3000-152-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/3000-64-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/3276-160-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/3276-74-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/3288-48-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/3288-134-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/3748-156-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/3748-144-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/4032-162-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/4032-99-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/4380-24-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/4380-108-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/4732-73-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/4732-0-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/4732-1-0x0000000000432000-0x0000000000433000-memory.dmp

      Filesize

      4KB

    • memory/4756-56-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/4756-143-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/5024-109-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/5024-161-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/5044-158-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/5044-127-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB