Analysis

  • max time kernel
    160s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 21:26

General

  • Target

    429ad4903a0eb5549c81d73f1a6069f6.exe

  • Size

    990KB

  • MD5

    429ad4903a0eb5549c81d73f1a6069f6

  • SHA1

    46b6d31c7105411079989ee25081756ae971e936

  • SHA256

    2c5442a2626607cc413da2dc65b02f0fbacb261243ddde5672ba811c27f43c08

  • SHA512

    e2b73c3b47dfd96aa49e710fb41b94830900d39125c45b91135f27eb3fc613600e4500dbf03ce7647cc10550fe378ee23ad9ce3b30cccdafaefffe5c9b81adf5

  • SSDEEP

    24576:JyF5ejFHm7pOl3vlBOWsrqYcjXaQBqEnw8u2G65e:8aBHi4hfDs+YcjXaQhwHt6

Malware Config

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\429ad4903a0eb5549c81d73f1a6069f6.exe
    "C:\Users\Admin\AppData\Local\Temp\429ad4903a0eb5549c81d73f1a6069f6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3456820.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3456820.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2934588.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2934588.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5111296.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5111296.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2892
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7649377.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7649377.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2428
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9415989.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9415989.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2128
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2248
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2516
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 36
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2896

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    3
    T1112

    Impair Defenses

    2
    T1562

    Disable or Modify Tools

    2
    T1562.001

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3456820.exe
      Filesize

      889KB

      MD5

      7b2198d48d70022ff7b3a10efcac8acf

      SHA1

      5e50b89067ff2445b1c6563a1b50b2a5eaeca6c0

      SHA256

      5beca64a8aea1aa8a09ae886ef4bc2bfebf2e25ca080c227e306ade2720bb938

      SHA512

      21fcb0161470cc4037896db3d11c461b1385ab8a3401aec2bf9de20ef1b096ad8ecf23052f99678afeb6d7021525048b042bb52e979644dd03f27aa57a0a0464

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3456820.exe
      Filesize

      889KB

      MD5

      7b2198d48d70022ff7b3a10efcac8acf

      SHA1

      5e50b89067ff2445b1c6563a1b50b2a5eaeca6c0

      SHA256

      5beca64a8aea1aa8a09ae886ef4bc2bfebf2e25ca080c227e306ade2720bb938

      SHA512

      21fcb0161470cc4037896db3d11c461b1385ab8a3401aec2bf9de20ef1b096ad8ecf23052f99678afeb6d7021525048b042bb52e979644dd03f27aa57a0a0464

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2934588.exe
      Filesize

      709KB

      MD5

      c087471094c89ec93e056259fa747d08

      SHA1

      c8ae0c7894d8daad5e7d583514e2104ce0ccef6e

      SHA256

      a86c7e5b3ae2c00419688b5d930c5131ddd8482e7f90a1f1163a92f43a4bbd29

      SHA512

      b2159a056420b72657b811698789d66a3ba880fa0c9102b58910d29419603754a9d7e0a191ef6034ef49e857ba1418293da9c276f4673bbe1d307486d46bbc02

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2934588.exe
      Filesize

      709KB

      MD5

      c087471094c89ec93e056259fa747d08

      SHA1

      c8ae0c7894d8daad5e7d583514e2104ce0ccef6e

      SHA256

      a86c7e5b3ae2c00419688b5d930c5131ddd8482e7f90a1f1163a92f43a4bbd29

      SHA512

      b2159a056420b72657b811698789d66a3ba880fa0c9102b58910d29419603754a9d7e0a191ef6034ef49e857ba1418293da9c276f4673bbe1d307486d46bbc02

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5111296.exe
      Filesize

      526KB

      MD5

      508ab970afb4ac300f42f0c1a87063a7

      SHA1

      43e2655210c8e0131c8bb540cdab1816013f5ef3

      SHA256

      c8a0611fc96b03ec92fbbac392fc2c7c81cb20a580fe81eca9390012d2fc93f5

      SHA512

      55f5e0c2cff61c348d6728c3ff6f19ff17c04374306033ab1f7d028469d8964b338029c3df8bc960529132ce2d6aafe431e796de1a82c44d17b36637f1057417

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5111296.exe
      Filesize

      526KB

      MD5

      508ab970afb4ac300f42f0c1a87063a7

      SHA1

      43e2655210c8e0131c8bb540cdab1816013f5ef3

      SHA256

      c8a0611fc96b03ec92fbbac392fc2c7c81cb20a580fe81eca9390012d2fc93f5

      SHA512

      55f5e0c2cff61c348d6728c3ff6f19ff17c04374306033ab1f7d028469d8964b338029c3df8bc960529132ce2d6aafe431e796de1a82c44d17b36637f1057417

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7649377.exe
      Filesize

      296KB

      MD5

      1daa9572f97fd034ae59945b714e206a

      SHA1

      62c680d407d2057265801988f40c34a2953dca89

      SHA256

      fcb43bad07dbc70c273b78f591f41a1826cec51b9f2af6cb016504e26ad72cba

      SHA512

      0d563f59026506f5f1cd411cc070e22a045f16b2223e1bb62cc535be5ab8b52a2feedcf46b2b701b286d2054adae5e26d93f406a10076523e1b1e82578ea9637

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7649377.exe
      Filesize

      296KB

      MD5

      1daa9572f97fd034ae59945b714e206a

      SHA1

      62c680d407d2057265801988f40c34a2953dca89

      SHA256

      fcb43bad07dbc70c273b78f591f41a1826cec51b9f2af6cb016504e26ad72cba

      SHA512

      0d563f59026506f5f1cd411cc070e22a045f16b2223e1bb62cc535be5ab8b52a2feedcf46b2b701b286d2054adae5e26d93f406a10076523e1b1e82578ea9637

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9415989.exe
      Filesize

      11KB

      MD5

      9e710f9caa4b24f28b8d0fa5b0544b6e

      SHA1

      9f7d03509e02a1dedfd72b4b2197ec77de68a06f

      SHA256

      08f7b6929b78ae823572c05a0b1d2b349396f58cabc9573b469033f897d41e94

      SHA512

      9d66cee104f9f83cee248fa730402e9bc5fb0e2b9195ce57e19d28d7595f31be61d2d67746fa7df46913b527ca613f154209efb669ca7a1a95a5a2347db624ac

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9415989.exe
      Filesize

      11KB

      MD5

      9e710f9caa4b24f28b8d0fa5b0544b6e

      SHA1

      9f7d03509e02a1dedfd72b4b2197ec77de68a06f

      SHA256

      08f7b6929b78ae823572c05a0b1d2b349396f58cabc9573b469033f897d41e94

      SHA512

      9d66cee104f9f83cee248fa730402e9bc5fb0e2b9195ce57e19d28d7595f31be61d2d67746fa7df46913b527ca613f154209efb669ca7a1a95a5a2347db624ac

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
      Filesize

      276KB

      MD5

      76a2f1d59ebafc54cb439fa26557ded5

      SHA1

      8ae1664146fbc007d502848f91c6abda54e194f3

      SHA256

      0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

      SHA512

      3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
      Filesize

      276KB

      MD5

      76a2f1d59ebafc54cb439fa26557ded5

      SHA1

      8ae1664146fbc007d502848f91c6abda54e194f3

      SHA256

      0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

      SHA512

      3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
      Filesize

      276KB

      MD5

      76a2f1d59ebafc54cb439fa26557ded5

      SHA1

      8ae1664146fbc007d502848f91c6abda54e194f3

      SHA256

      0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

      SHA512

      3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3456820.exe
      Filesize

      889KB

      MD5

      7b2198d48d70022ff7b3a10efcac8acf

      SHA1

      5e50b89067ff2445b1c6563a1b50b2a5eaeca6c0

      SHA256

      5beca64a8aea1aa8a09ae886ef4bc2bfebf2e25ca080c227e306ade2720bb938

      SHA512

      21fcb0161470cc4037896db3d11c461b1385ab8a3401aec2bf9de20ef1b096ad8ecf23052f99678afeb6d7021525048b042bb52e979644dd03f27aa57a0a0464

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3456820.exe
      Filesize

      889KB

      MD5

      7b2198d48d70022ff7b3a10efcac8acf

      SHA1

      5e50b89067ff2445b1c6563a1b50b2a5eaeca6c0

      SHA256

      5beca64a8aea1aa8a09ae886ef4bc2bfebf2e25ca080c227e306ade2720bb938

      SHA512

      21fcb0161470cc4037896db3d11c461b1385ab8a3401aec2bf9de20ef1b096ad8ecf23052f99678afeb6d7021525048b042bb52e979644dd03f27aa57a0a0464

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2934588.exe
      Filesize

      709KB

      MD5

      c087471094c89ec93e056259fa747d08

      SHA1

      c8ae0c7894d8daad5e7d583514e2104ce0ccef6e

      SHA256

      a86c7e5b3ae2c00419688b5d930c5131ddd8482e7f90a1f1163a92f43a4bbd29

      SHA512

      b2159a056420b72657b811698789d66a3ba880fa0c9102b58910d29419603754a9d7e0a191ef6034ef49e857ba1418293da9c276f4673bbe1d307486d46bbc02

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2934588.exe
      Filesize

      709KB

      MD5

      c087471094c89ec93e056259fa747d08

      SHA1

      c8ae0c7894d8daad5e7d583514e2104ce0ccef6e

      SHA256

      a86c7e5b3ae2c00419688b5d930c5131ddd8482e7f90a1f1163a92f43a4bbd29

      SHA512

      b2159a056420b72657b811698789d66a3ba880fa0c9102b58910d29419603754a9d7e0a191ef6034ef49e857ba1418293da9c276f4673bbe1d307486d46bbc02

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5111296.exe
      Filesize

      526KB

      MD5

      508ab970afb4ac300f42f0c1a87063a7

      SHA1

      43e2655210c8e0131c8bb540cdab1816013f5ef3

      SHA256

      c8a0611fc96b03ec92fbbac392fc2c7c81cb20a580fe81eca9390012d2fc93f5

      SHA512

      55f5e0c2cff61c348d6728c3ff6f19ff17c04374306033ab1f7d028469d8964b338029c3df8bc960529132ce2d6aafe431e796de1a82c44d17b36637f1057417

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5111296.exe
      Filesize

      526KB

      MD5

      508ab970afb4ac300f42f0c1a87063a7

      SHA1

      43e2655210c8e0131c8bb540cdab1816013f5ef3

      SHA256

      c8a0611fc96b03ec92fbbac392fc2c7c81cb20a580fe81eca9390012d2fc93f5

      SHA512

      55f5e0c2cff61c348d6728c3ff6f19ff17c04374306033ab1f7d028469d8964b338029c3df8bc960529132ce2d6aafe431e796de1a82c44d17b36637f1057417

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7649377.exe
      Filesize

      296KB

      MD5

      1daa9572f97fd034ae59945b714e206a

      SHA1

      62c680d407d2057265801988f40c34a2953dca89

      SHA256

      fcb43bad07dbc70c273b78f591f41a1826cec51b9f2af6cb016504e26ad72cba

      SHA512

      0d563f59026506f5f1cd411cc070e22a045f16b2223e1bb62cc535be5ab8b52a2feedcf46b2b701b286d2054adae5e26d93f406a10076523e1b1e82578ea9637

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7649377.exe
      Filesize

      296KB

      MD5

      1daa9572f97fd034ae59945b714e206a

      SHA1

      62c680d407d2057265801988f40c34a2953dca89

      SHA256

      fcb43bad07dbc70c273b78f591f41a1826cec51b9f2af6cb016504e26ad72cba

      SHA512

      0d563f59026506f5f1cd411cc070e22a045f16b2223e1bb62cc535be5ab8b52a2feedcf46b2b701b286d2054adae5e26d93f406a10076523e1b1e82578ea9637

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9415989.exe
      Filesize

      11KB

      MD5

      9e710f9caa4b24f28b8d0fa5b0544b6e

      SHA1

      9f7d03509e02a1dedfd72b4b2197ec77de68a06f

      SHA256

      08f7b6929b78ae823572c05a0b1d2b349396f58cabc9573b469033f897d41e94

      SHA512

      9d66cee104f9f83cee248fa730402e9bc5fb0e2b9195ce57e19d28d7595f31be61d2d67746fa7df46913b527ca613f154209efb669ca7a1a95a5a2347db624ac

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
      Filesize

      276KB

      MD5

      76a2f1d59ebafc54cb439fa26557ded5

      SHA1

      8ae1664146fbc007d502848f91c6abda54e194f3

      SHA256

      0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

      SHA512

      3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
      Filesize

      276KB

      MD5

      76a2f1d59ebafc54cb439fa26557ded5

      SHA1

      8ae1664146fbc007d502848f91c6abda54e194f3

      SHA256

      0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

      SHA512

      3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
      Filesize

      276KB

      MD5

      76a2f1d59ebafc54cb439fa26557ded5

      SHA1

      8ae1664146fbc007d502848f91c6abda54e194f3

      SHA256

      0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

      SHA512

      3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
      Filesize

      276KB

      MD5

      76a2f1d59ebafc54cb439fa26557ded5

      SHA1

      8ae1664146fbc007d502848f91c6abda54e194f3

      SHA256

      0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

      SHA512

      3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
      Filesize

      276KB

      MD5

      76a2f1d59ebafc54cb439fa26557ded5

      SHA1

      8ae1664146fbc007d502848f91c6abda54e194f3

      SHA256

      0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

      SHA512

      3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
      Filesize

      276KB

      MD5

      76a2f1d59ebafc54cb439fa26557ded5

      SHA1

      8ae1664146fbc007d502848f91c6abda54e194f3

      SHA256

      0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

      SHA512

      3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

    • memory/2128-51-0x000007FEF4D70000-0x000007FEF575C000-memory.dmp
      Filesize

      9.9MB

    • memory/2128-50-0x000007FEF4D70000-0x000007FEF575C000-memory.dmp
      Filesize

      9.9MB

    • memory/2128-48-0x000007FEF4D70000-0x000007FEF575C000-memory.dmp
      Filesize

      9.9MB

    • memory/2128-49-0x0000000000C60000-0x0000000000C6A000-memory.dmp
      Filesize

      40KB

    • memory/2516-73-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
      Filesize

      4KB

    • memory/2516-69-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2516-71-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2516-61-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2516-74-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2516-76-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2516-78-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2516-79-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2516-67-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2516-65-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2516-63-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2516-83-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB