Analysis

  • max time kernel
    119s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 06:42

General

  • Target

    769b30ce75344facc1900f9ac642d760N.exe

  • Size

    52KB

  • MD5

    769b30ce75344facc1900f9ac642d760

  • SHA1

    54c234564e97d7c401846fdc9b553d90f3325895

  • SHA256

    353cad2e2db635c3dbe7301dc03bcda5eb98797da0c1f1e98f10db8458d281f4

  • SHA512

    07f07fae6d5ced4e99770faad9c21f1704b1faa892a004361cf23dbe19b965b36fbe001a417edb137be8c036b3df294984c3d4618b85d3825352e1ffd4b02621

  • SSDEEP

    768:d+ciLamXW9XgMxjFkpvMVX8q18q13yO1oj5n/w3Dkfw:IzaEW5gMxZVXf8a3yO1opw3z

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 10 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 5 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 5 IoCs
  • Windows security bypass 2 TTPs 25 IoCs
  • Blocks application from running via registry modification 30 IoCs

    Adds application to list of disallowed applications.

  • Disables RegEdit via registry modification 10 IoCs
  • Disables use of System Restore points 1 TTPs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 10 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies system executable filetype association 2 TTPs 62 IoCs
  • Windows security modification 2 TTPs 30 IoCs
  • Adds Run key to start application 2 TTPs 15 IoCs
  • Drops desktop.ini file(s) 14 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Windows directory 20 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 45 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • System policy modification 1 TTPs 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\769b30ce75344facc1900f9ac642d760N.exe
    "C:\Users\Admin\AppData\Local\Temp\769b30ce75344facc1900f9ac642d760N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Windows security bypass
    • Blocks application from running via registry modification
    • Disables RegEdit via registry modification
    • Event Triggered Execution: Image File Execution Options Injection
    • Modifies system executable filetype association
    • Windows security modification
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2900
    • C:\Windows\nEwb0Rn.exe
      C:\Windows\nEwb0Rn.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2104
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1876
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4460
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1728
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3040
    • C:\Windows\SysWOW64\WishfulThinking.exe
      C:\Windows\system32\WishfulThinking.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3120
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:452
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5104
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4996
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1004
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3812
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4256
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3448
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:208
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1676
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2124
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1304
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2860
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3196
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    52KB

    MD5

    b0c53243d0389cf5d5c364f167bbee6e

    SHA1

    f6969bab6c395232d85245fd23816077500ef969

    SHA256

    0be7ccfa6a892166881f59eccc931443a13895060f36cea28185aa1b8920a44e

    SHA512

    976bb21f02a931b40dd95f5ea223273ea0c332fbb771df16dfceeeb642b780cc9c56ed0518d05e0a32f8077108ba1852daaea257e9a1fd89f239da507f3f8d1f

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    52KB

    MD5

    33a0aa9124203d056049dae1309fbf72

    SHA1

    f91f3a1bb7068ea2ab25bef37a1ea3ae19ee4014

    SHA256

    f7f112cd65b379aae7675f929d0636bcdf35702ecc4b5d51b644e055e334f2ef

    SHA512

    7abaf2712a3bbafa5c0140e2841614bc512c6c709ac1cbae116b13e8b9c4582e2d4f5abd2b1f185d8a079cf5d1f0840c632b51631dc465aefd7f28b73bf169fa

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    52KB

    MD5

    afd4bcd6f11218d25dd0771887f86c0e

    SHA1

    dd8e0cf07f6cd7103823512862275d1a9a1ff3a9

    SHA256

    d944c26838c9bdd51500ee5e7bef17672a45d21f442f1f0be352f9c756289221

    SHA512

    232137dac193bb81ba396eee7ac030cd9ca33954ca832a7059d9aaf4e2cd82364974b58dd26ad115ba74f969b6d3831cf7da40f30b9d5dbe29d1ec2ad2e29ac3

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    74d222409bb7a53aae7d2dde5231e72a

    SHA1

    75dbbad0de8ac183c02ff0652082b88511576341

    SHA256

    afdbc36ec04712d5278dd948cf72f7a3a424f8325adcfd8d0691b89d3d3b712d

    SHA512

    ec2e4a39a65aadad84c08c78ea3edfa19abc912823ec4772a6b33ce8f436c0d2da5225428f2daf4bffd1335d24ffbd400428eed92056c2a97aebc2cfb9239259

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    769b30ce75344facc1900f9ac642d760

    SHA1

    54c234564e97d7c401846fdc9b553d90f3325895

    SHA256

    353cad2e2db635c3dbe7301dc03bcda5eb98797da0c1f1e98f10db8458d281f4

    SHA512

    07f07fae6d5ced4e99770faad9c21f1704b1faa892a004361cf23dbe19b965b36fbe001a417edb137be8c036b3df294984c3d4618b85d3825352e1ffd4b02621

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    d85e154f4a8804f1c8fa524666713d31

    SHA1

    bac103b8b48c4be83e6a23f64e680ea730529341

    SHA256

    02c6968002f8677404d5e12cfd0b32a75caaaf28af7466b7803fd03f38b5900c

    SHA512

    a679b3dc3f7cbc5506739a6367c1df71a254cf57da2570c4255ffc5ad29e1b341ff748977e9367818abd219e582af75541dcf4771310b9ae136fa51d6421163e

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    859d0dba977c4472619eaad4903fe8ba

    SHA1

    a60c7c0ffa0214e22b3fb1361ab8a186f630c9dc

    SHA256

    336d52f0d0c481f88940c37cfe8c9a4704592b0251546eafa27929717ddd2bb2

    SHA512

    32eb4d16871043484a6ac049f397769116a0f37c1729dd267a97b8107760da2fb5ac73245a3334b7d8ca266a7e6056f4bfc8920f668244c3a392e25a996eb796

  • C:\Windows\SysWOW64\WishfulThinking.exe

    Filesize

    52KB

    MD5

    e83b00289c5caad83d919f315ae1f2a0

    SHA1

    e8816a2c2392c013c3ed047dab658a58bd66cbdb

    SHA256

    06c2f45f2a333e9b4413a9909525a6337f850c2494e01140e5e619176ecb84e7

    SHA512

    244cc9bb64c63947f00bf9c0ac20023a774006f815e3e7bda886d73c889e7454b1ad2050494063e6e9ed794e5d4e927fff42e318a9a4df1cd0bcf94662dd6e51

  • C:\Windows\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    7ea72e06dc78b33aa7b5bfb094268860

    SHA1

    86f4dc72004dc8e1ff5dca95d7d49fbc356fdfab

    SHA256

    f1720a6b32f705ca171afbf5b816ccbb1a4289a92d34ac18f902640ed7b4600e

    SHA512

    2b1d9b72d017d94c97a553dce94a04519f045d9962ba5bf0159d821a0402d51c0853968a8353a2f961f1f334a3f18d206c279ea038a285c79e93df3d9d2a4086

  • C:\about.htm

    Filesize

    2KB

    MD5

    94c0c5518c4f4bb044842a006d04932a

    SHA1

    23d9a914f6681d65e2b1faa171f4cf492562ebdb

    SHA256

    224c4e5cdc0e7495c5fb5d1f52d76807092b5cc2d0a7c95fa612ff7b1412706e

    SHA512

    79cb2cd9e19ac3cc8bd94f1a20369e61224f8db02bc04d1f5768d62163b68467a3d317808a942bc7cca6ca84c221bb54a76e097f543c88bb89f0a3c9534ff3bb

  • C:\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    747b1fd92b913a9e7afe109747af26ec

    SHA1

    6276e7c69f5dd3003a2817badb19e39a24b593fb

    SHA256

    a12a429670c1911a45c734a8341d518ba008e25aedf5754c5eb05a4e590c056e

    SHA512

    dbb9aee755cc05facf8fc6ec3104448a4794f4d7060f4a5a956da3667caa9710bd09c4fa2407ad293434ee0b80a60a653f6692c691846df232aedbfb9d95fa86

  • memory/208-253-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/452-231-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1004-288-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1304-290-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1676-280-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1676-259-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1728-160-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1728-262-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1876-149-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1876-131-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2104-232-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2104-426-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2104-76-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2124-429-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2124-95-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2124-258-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2860-315-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2900-100-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2900-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3040-287-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3120-81-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3120-252-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3120-427-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3196-342-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3432-346-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3432-372-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3448-234-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3448-222-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3812-89-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3812-428-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3812-255-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4256-224-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4256-216-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4460-148-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4460-155-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4996-264-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/5104-238-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB