Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 22:23

General

  • Target

    5658f79541070a0e9cb7aefb079d5b0a.exe

  • Size

    1.0MB

  • MD5

    5658f79541070a0e9cb7aefb079d5b0a

  • SHA1

    8c5dab81f88a94ad3ba7bf465c4484566f2d6c6a

  • SHA256

    01c599527dc62eba8ba0acb2b70450dedb1892efb9bfa57dac69394df43a6728

  • SHA512

    4730c9a4306ec3114419b92cbedccc4980c77c4f4f48fdaf1cf1b11fe18c5947c1123b7d04e5c6c180af29bf255d0615644353bd53dc47c73627520752afa198

  • SSDEEP

    24576:8yT32gm1kuznBPN8clPvR9Jrb0mEPtYV3BglCi48bbpGbTkG4:rT32gqkuznBOclPhrb4KQC38bbpG0

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5658f79541070a0e9cb7aefb079d5b0a.exe
    "C:\Users\Admin\AppData\Local\Temp\5658f79541070a0e9cb7aefb079d5b0a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4394743.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4394743.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6419608.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6419608.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8892533.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8892533.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3060
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8376247.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8376247.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2772
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4631931.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4631931.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2616
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2780
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2656
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 268
                  8⤵
                  • Program crash
                  PID:2560
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 276
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4394743.exe

    Filesize

    971KB

    MD5

    6becf9720370b7d197e6903c12c68dad

    SHA1

    b0458af76106e13bd7f5570a9001e8a8d70e05fb

    SHA256

    5362f0678cf83f51b5d26038008f16e6be18f325fb7f7c4d0bd0ce921651860f

    SHA512

    afffe479334076fead87a8e371cfffb578248b0e71fd2646ef48ddaef280b39ce8894d45132f804ab828984e4cfc16c505f3ebd5295e993c8643b3883c440308

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4394743.exe

    Filesize

    971KB

    MD5

    6becf9720370b7d197e6903c12c68dad

    SHA1

    b0458af76106e13bd7f5570a9001e8a8d70e05fb

    SHA256

    5362f0678cf83f51b5d26038008f16e6be18f325fb7f7c4d0bd0ce921651860f

    SHA512

    afffe479334076fead87a8e371cfffb578248b0e71fd2646ef48ddaef280b39ce8894d45132f804ab828984e4cfc16c505f3ebd5295e993c8643b3883c440308

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6419608.exe

    Filesize

    789KB

    MD5

    80c9261a408225aa097661d2701478ca

    SHA1

    ddc9440cd752d0c57757c36b20f8b131d70905c4

    SHA256

    a7a7ea80c381ef788951c215c5b1d2bc75f7f8a089546ed6dd3c211d9b2eff5e

    SHA512

    0f28555ee493fdd055d746fded833f055cb029b5d51cb692019751ee9cbfd4f473b2988a9db532799d52db51fd0886e7ef5c6d9ba58598a8453f3f772da6af08

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6419608.exe

    Filesize

    789KB

    MD5

    80c9261a408225aa097661d2701478ca

    SHA1

    ddc9440cd752d0c57757c36b20f8b131d70905c4

    SHA256

    a7a7ea80c381ef788951c215c5b1d2bc75f7f8a089546ed6dd3c211d9b2eff5e

    SHA512

    0f28555ee493fdd055d746fded833f055cb029b5d51cb692019751ee9cbfd4f473b2988a9db532799d52db51fd0886e7ef5c6d9ba58598a8453f3f772da6af08

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8892533.exe

    Filesize

    606KB

    MD5

    a5430ed4f9c20df94ab783828869ee6e

    SHA1

    4c08869a431905e659303352ec37445f25edb458

    SHA256

    1a59398d2cf3f9412f1283d78ea1422b796294c90b51d10f5161e91846a19c9e

    SHA512

    50aac8d427556eeeaeceb4c4df60dc3aa5e2e46c0d3c44738d691d79d5cf04917585c0ad2f6f0ddfd1250b01362378a2421d34fd0e5a0ef007e16d5511499e7c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8892533.exe

    Filesize

    606KB

    MD5

    a5430ed4f9c20df94ab783828869ee6e

    SHA1

    4c08869a431905e659303352ec37445f25edb458

    SHA256

    1a59398d2cf3f9412f1283d78ea1422b796294c90b51d10f5161e91846a19c9e

    SHA512

    50aac8d427556eeeaeceb4c4df60dc3aa5e2e46c0d3c44738d691d79d5cf04917585c0ad2f6f0ddfd1250b01362378a2421d34fd0e5a0ef007e16d5511499e7c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8376247.exe

    Filesize

    335KB

    MD5

    ba58c863e4832dd706d1059eb620a307

    SHA1

    fcc96aa8d1fff1b0fc8a49cd6b7b7e5a540b6e0b

    SHA256

    027c94384183d99d047e161bc4ca932d56937ffd3adecf0fc332d722dc54fe2d

    SHA512

    355bd4429c84b69ac98c14f80a821165beade9a9aa46c30ef7550c5b5de5e112d8213f610e3c0b2a3ecfbada5fa8a0ce52cb490047ae05d197cd15acb34cd988

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8376247.exe

    Filesize

    335KB

    MD5

    ba58c863e4832dd706d1059eb620a307

    SHA1

    fcc96aa8d1fff1b0fc8a49cd6b7b7e5a540b6e0b

    SHA256

    027c94384183d99d047e161bc4ca932d56937ffd3adecf0fc332d722dc54fe2d

    SHA512

    355bd4429c84b69ac98c14f80a821165beade9a9aa46c30ef7550c5b5de5e112d8213f610e3c0b2a3ecfbada5fa8a0ce52cb490047ae05d197cd15acb34cd988

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4631931.exe

    Filesize

    11KB

    MD5

    dc60f0c6c3c7a8ac4f2a4f95a36f94bc

    SHA1

    5daba85b1a40c2ca8e34ff00612e8070cd426768

    SHA256

    338e974fcfa569f03bc276983ad2ac3d1413e1c492b8efaada49f83442eca3b4

    SHA512

    f56f5cc9652c24716ea8f556027cb2c9c1a9a708b3150b73f174221e639904fea8136edd5c18a27b049b077d8f33c7e9bb6d3df210684686ffa70deb5c7101bd

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4631931.exe

    Filesize

    11KB

    MD5

    dc60f0c6c3c7a8ac4f2a4f95a36f94bc

    SHA1

    5daba85b1a40c2ca8e34ff00612e8070cd426768

    SHA256

    338e974fcfa569f03bc276983ad2ac3d1413e1c492b8efaada49f83442eca3b4

    SHA512

    f56f5cc9652c24716ea8f556027cb2c9c1a9a708b3150b73f174221e639904fea8136edd5c18a27b049b077d8f33c7e9bb6d3df210684686ffa70deb5c7101bd

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4394743.exe

    Filesize

    971KB

    MD5

    6becf9720370b7d197e6903c12c68dad

    SHA1

    b0458af76106e13bd7f5570a9001e8a8d70e05fb

    SHA256

    5362f0678cf83f51b5d26038008f16e6be18f325fb7f7c4d0bd0ce921651860f

    SHA512

    afffe479334076fead87a8e371cfffb578248b0e71fd2646ef48ddaef280b39ce8894d45132f804ab828984e4cfc16c505f3ebd5295e993c8643b3883c440308

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4394743.exe

    Filesize

    971KB

    MD5

    6becf9720370b7d197e6903c12c68dad

    SHA1

    b0458af76106e13bd7f5570a9001e8a8d70e05fb

    SHA256

    5362f0678cf83f51b5d26038008f16e6be18f325fb7f7c4d0bd0ce921651860f

    SHA512

    afffe479334076fead87a8e371cfffb578248b0e71fd2646ef48ddaef280b39ce8894d45132f804ab828984e4cfc16c505f3ebd5295e993c8643b3883c440308

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6419608.exe

    Filesize

    789KB

    MD5

    80c9261a408225aa097661d2701478ca

    SHA1

    ddc9440cd752d0c57757c36b20f8b131d70905c4

    SHA256

    a7a7ea80c381ef788951c215c5b1d2bc75f7f8a089546ed6dd3c211d9b2eff5e

    SHA512

    0f28555ee493fdd055d746fded833f055cb029b5d51cb692019751ee9cbfd4f473b2988a9db532799d52db51fd0886e7ef5c6d9ba58598a8453f3f772da6af08

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6419608.exe

    Filesize

    789KB

    MD5

    80c9261a408225aa097661d2701478ca

    SHA1

    ddc9440cd752d0c57757c36b20f8b131d70905c4

    SHA256

    a7a7ea80c381ef788951c215c5b1d2bc75f7f8a089546ed6dd3c211d9b2eff5e

    SHA512

    0f28555ee493fdd055d746fded833f055cb029b5d51cb692019751ee9cbfd4f473b2988a9db532799d52db51fd0886e7ef5c6d9ba58598a8453f3f772da6af08

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8892533.exe

    Filesize

    606KB

    MD5

    a5430ed4f9c20df94ab783828869ee6e

    SHA1

    4c08869a431905e659303352ec37445f25edb458

    SHA256

    1a59398d2cf3f9412f1283d78ea1422b796294c90b51d10f5161e91846a19c9e

    SHA512

    50aac8d427556eeeaeceb4c4df60dc3aa5e2e46c0d3c44738d691d79d5cf04917585c0ad2f6f0ddfd1250b01362378a2421d34fd0e5a0ef007e16d5511499e7c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8892533.exe

    Filesize

    606KB

    MD5

    a5430ed4f9c20df94ab783828869ee6e

    SHA1

    4c08869a431905e659303352ec37445f25edb458

    SHA256

    1a59398d2cf3f9412f1283d78ea1422b796294c90b51d10f5161e91846a19c9e

    SHA512

    50aac8d427556eeeaeceb4c4df60dc3aa5e2e46c0d3c44738d691d79d5cf04917585c0ad2f6f0ddfd1250b01362378a2421d34fd0e5a0ef007e16d5511499e7c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8376247.exe

    Filesize

    335KB

    MD5

    ba58c863e4832dd706d1059eb620a307

    SHA1

    fcc96aa8d1fff1b0fc8a49cd6b7b7e5a540b6e0b

    SHA256

    027c94384183d99d047e161bc4ca932d56937ffd3adecf0fc332d722dc54fe2d

    SHA512

    355bd4429c84b69ac98c14f80a821165beade9a9aa46c30ef7550c5b5de5e112d8213f610e3c0b2a3ecfbada5fa8a0ce52cb490047ae05d197cd15acb34cd988

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8376247.exe

    Filesize

    335KB

    MD5

    ba58c863e4832dd706d1059eb620a307

    SHA1

    fcc96aa8d1fff1b0fc8a49cd6b7b7e5a540b6e0b

    SHA256

    027c94384183d99d047e161bc4ca932d56937ffd3adecf0fc332d722dc54fe2d

    SHA512

    355bd4429c84b69ac98c14f80a821165beade9a9aa46c30ef7550c5b5de5e112d8213f610e3c0b2a3ecfbada5fa8a0ce52cb490047ae05d197cd15acb34cd988

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4631931.exe

    Filesize

    11KB

    MD5

    dc60f0c6c3c7a8ac4f2a4f95a36f94bc

    SHA1

    5daba85b1a40c2ca8e34ff00612e8070cd426768

    SHA256

    338e974fcfa569f03bc276983ad2ac3d1413e1c492b8efaada49f83442eca3b4

    SHA512

    f56f5cc9652c24716ea8f556027cb2c9c1a9a708b3150b73f174221e639904fea8136edd5c18a27b049b077d8f33c7e9bb6d3df210684686ffa70deb5c7101bd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • memory/2616-49-0x000007FEF5710000-0x000007FEF60FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2616-51-0x000007FEF5710000-0x000007FEF60FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2616-48-0x0000000000890000-0x000000000089A000-memory.dmp

    Filesize

    40KB

  • memory/2616-50-0x000007FEF5710000-0x000007FEF60FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2656-68-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2656-65-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2656-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2656-64-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2656-70-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2656-72-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2656-63-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2656-66-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2656-61-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2656-62-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB