Analysis
-
max time kernel
154s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe
Resource
win7-20220812-en
General
-
Target
2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe
-
Size
355KB
-
MD5
0a1c1f3ce0c136666304b33ba0ffd511
-
SHA1
716af8cce624dfbf728b7d6a06c9fb6053c58feb
-
SHA256
2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1
-
SHA512
54b55ec42c7d7749dbdcd187f9ad4f5ed1092a7c25606cea34c03ea283bf154aa3a6cc602a640dd07fbb72a9b8cbb2b7f7468ec0f03edfb45f643e3b8029c536
-
SSDEEP
6144:l+xDVG0BpAComW1EhiRApdwdLuKYrmSdVgjCs7PE/Ol:wa0BmCom5JwVgCCKjCkPGOl
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 1940 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe 1356 WaterMark.exe 612 WaterMark.exe -
resource yara_rule behavioral1/memory/900-62-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/900-64-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/900-70-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/1940-73-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/900-74-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/900-81-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1940-80-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1356-92-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/612-93-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/1356-94-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/612-240-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1356-241-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 900 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe 900 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe 900 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe 1940 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe 900 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe 1940 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\WaterMark.exe 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px42AC.tmp 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe File opened for modification C:\Program Files (x86)\Microsoft\px42BC.tmp 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1356 WaterMark.exe 1356 WaterMark.exe 612 WaterMark.exe 612 WaterMark.exe 612 WaterMark.exe 1356 WaterMark.exe 612 WaterMark.exe 1356 WaterMark.exe 1356 WaterMark.exe 612 WaterMark.exe 1356 WaterMark.exe 612 WaterMark.exe 612 WaterMark.exe 612 WaterMark.exe 1356 WaterMark.exe 1356 WaterMark.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1356 WaterMark.exe Token: SeDebugPrivilege 612 WaterMark.exe Token: SeDebugPrivilege 1620 svchost.exe Token: SeDebugPrivilege 1544 svchost.exe Token: SeDebugPrivilege 1356 WaterMark.exe Token: SeDebugPrivilege 612 WaterMark.exe Token: SeDebugPrivilege 852 svchost.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 1940 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe 900 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe 1356 WaterMark.exe 612 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 900 wrote to memory of 1940 900 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe 27 PID 900 wrote to memory of 1940 900 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe 27 PID 900 wrote to memory of 1940 900 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe 27 PID 900 wrote to memory of 1940 900 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe 27 PID 900 wrote to memory of 1356 900 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe 29 PID 900 wrote to memory of 1356 900 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe 29 PID 900 wrote to memory of 1356 900 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe 29 PID 900 wrote to memory of 1356 900 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe 29 PID 1940 wrote to memory of 612 1940 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe 28 PID 1940 wrote to memory of 612 1940 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe 28 PID 1940 wrote to memory of 612 1940 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe 28 PID 1940 wrote to memory of 612 1940 2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe 28 PID 612 wrote to memory of 1404 612 WaterMark.exe 30 PID 1356 wrote to memory of 852 1356 WaterMark.exe 31 PID 612 wrote to memory of 1404 612 WaterMark.exe 30 PID 612 wrote to memory of 1404 612 WaterMark.exe 30 PID 612 wrote to memory of 1404 612 WaterMark.exe 30 PID 612 wrote to memory of 1404 612 WaterMark.exe 30 PID 612 wrote to memory of 1404 612 WaterMark.exe 30 PID 612 wrote to memory of 1404 612 WaterMark.exe 30 PID 612 wrote to memory of 1404 612 WaterMark.exe 30 PID 612 wrote to memory of 1404 612 WaterMark.exe 30 PID 612 wrote to memory of 1404 612 WaterMark.exe 30 PID 1356 wrote to memory of 852 1356 WaterMark.exe 31 PID 1356 wrote to memory of 852 1356 WaterMark.exe 31 PID 1356 wrote to memory of 852 1356 WaterMark.exe 31 PID 1356 wrote to memory of 852 1356 WaterMark.exe 31 PID 1356 wrote to memory of 852 1356 WaterMark.exe 31 PID 1356 wrote to memory of 852 1356 WaterMark.exe 31 PID 1356 wrote to memory of 852 1356 WaterMark.exe 31 PID 1356 wrote to memory of 852 1356 WaterMark.exe 31 PID 1356 wrote to memory of 852 1356 WaterMark.exe 31 PID 612 wrote to memory of 1544 612 WaterMark.exe 33 PID 1356 wrote to memory of 1620 1356 WaterMark.exe 32 PID 1356 wrote to memory of 1620 1356 WaterMark.exe 32 PID 1356 wrote to memory of 1620 1356 WaterMark.exe 32 PID 1356 wrote to memory of 1620 1356 WaterMark.exe 32 PID 1356 wrote to memory of 1620 1356 WaterMark.exe 32 PID 1356 wrote to memory of 1620 1356 WaterMark.exe 32 PID 1356 wrote to memory of 1620 1356 WaterMark.exe 32 PID 1356 wrote to memory of 1620 1356 WaterMark.exe 32 PID 1356 wrote to memory of 1620 1356 WaterMark.exe 32 PID 1356 wrote to memory of 1620 1356 WaterMark.exe 32 PID 612 wrote to memory of 1544 612 WaterMark.exe 33 PID 612 wrote to memory of 1544 612 WaterMark.exe 33 PID 612 wrote to memory of 1544 612 WaterMark.exe 33 PID 612 wrote to memory of 1544 612 WaterMark.exe 33 PID 612 wrote to memory of 1544 612 WaterMark.exe 33 PID 612 wrote to memory of 1544 612 WaterMark.exe 33 PID 612 wrote to memory of 1544 612 WaterMark.exe 33 PID 612 wrote to memory of 1544 612 WaterMark.exe 33 PID 612 wrote to memory of 1544 612 WaterMark.exe 33 PID 1620 wrote to memory of 260 1620 svchost.exe 7 PID 1620 wrote to memory of 260 1620 svchost.exe 7 PID 1620 wrote to memory of 260 1620 svchost.exe 7 PID 1620 wrote to memory of 260 1620 svchost.exe 7 PID 1620 wrote to memory of 260 1620 svchost.exe 7 PID 1620 wrote to memory of 332 1620 svchost.exe 6 PID 1620 wrote to memory of 332 1620 svchost.exe 6 PID 1620 wrote to memory of 332 1620 svchost.exe 6 PID 1620 wrote to memory of 332 1620 svchost.exe 6 PID 1620 wrote to memory of 332 1620 svchost.exe 6 PID 1620 wrote to memory of 368 1620 svchost.exe 5 PID 1620 wrote to memory of 368 1620 svchost.exe 5
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:740
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:836
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:292
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:872
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵PID:1980
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:796
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1168
-
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:288
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:664
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:584
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1084
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1096
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1560
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1628
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:376
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe"C:\Users\Admin\AppData\Local\Temp\2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exeC:\Users\Admin\AppData\Local\Temp\2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1404
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
-
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d8ef16809d9ed53038666a123458f8c6
SHA1367a9e087defcd676c9a6dac6aa9a954b7372bf9
SHA25659fc1b83cc11205654e0e77888135d597ea79d28b258f11ad10f4f70db8afedd
SHA512d19e33b06193b8e5bab7e7f3d8b10c1aa6e1da7b4d8114ed8dfcf231ae4e8980c30eabea4048d1ce46938e8ebb908f3d1cb766adb55a38add5a8cbea147e85e8
-
Filesize
175KB
MD5d8ef16809d9ed53038666a123458f8c6
SHA1367a9e087defcd676c9a6dac6aa9a954b7372bf9
SHA25659fc1b83cc11205654e0e77888135d597ea79d28b258f11ad10f4f70db8afedd
SHA512d19e33b06193b8e5bab7e7f3d8b10c1aa6e1da7b4d8114ed8dfcf231ae4e8980c30eabea4048d1ce46938e8ebb908f3d1cb766adb55a38add5a8cbea147e85e8
-
Filesize
175KB
MD5d8ef16809d9ed53038666a123458f8c6
SHA1367a9e087defcd676c9a6dac6aa9a954b7372bf9
SHA25659fc1b83cc11205654e0e77888135d597ea79d28b258f11ad10f4f70db8afedd
SHA512d19e33b06193b8e5bab7e7f3d8b10c1aa6e1da7b4d8114ed8dfcf231ae4e8980c30eabea4048d1ce46938e8ebb908f3d1cb766adb55a38add5a8cbea147e85e8
-
C:\Users\Admin\AppData\Local\Temp\2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe
Filesize175KB
MD5d8ef16809d9ed53038666a123458f8c6
SHA1367a9e087defcd676c9a6dac6aa9a954b7372bf9
SHA25659fc1b83cc11205654e0e77888135d597ea79d28b258f11ad10f4f70db8afedd
SHA512d19e33b06193b8e5bab7e7f3d8b10c1aa6e1da7b4d8114ed8dfcf231ae4e8980c30eabea4048d1ce46938e8ebb908f3d1cb766adb55a38add5a8cbea147e85e8
-
C:\Users\Admin\AppData\Local\Temp\2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe
Filesize175KB
MD5d8ef16809d9ed53038666a123458f8c6
SHA1367a9e087defcd676c9a6dac6aa9a954b7372bf9
SHA25659fc1b83cc11205654e0e77888135d597ea79d28b258f11ad10f4f70db8afedd
SHA512d19e33b06193b8e5bab7e7f3d8b10c1aa6e1da7b4d8114ed8dfcf231ae4e8980c30eabea4048d1ce46938e8ebb908f3d1cb766adb55a38add5a8cbea147e85e8
-
Filesize
175KB
MD5d8ef16809d9ed53038666a123458f8c6
SHA1367a9e087defcd676c9a6dac6aa9a954b7372bf9
SHA25659fc1b83cc11205654e0e77888135d597ea79d28b258f11ad10f4f70db8afedd
SHA512d19e33b06193b8e5bab7e7f3d8b10c1aa6e1da7b4d8114ed8dfcf231ae4e8980c30eabea4048d1ce46938e8ebb908f3d1cb766adb55a38add5a8cbea147e85e8
-
Filesize
175KB
MD5d8ef16809d9ed53038666a123458f8c6
SHA1367a9e087defcd676c9a6dac6aa9a954b7372bf9
SHA25659fc1b83cc11205654e0e77888135d597ea79d28b258f11ad10f4f70db8afedd
SHA512d19e33b06193b8e5bab7e7f3d8b10c1aa6e1da7b4d8114ed8dfcf231ae4e8980c30eabea4048d1ce46938e8ebb908f3d1cb766adb55a38add5a8cbea147e85e8
-
Filesize
175KB
MD5d8ef16809d9ed53038666a123458f8c6
SHA1367a9e087defcd676c9a6dac6aa9a954b7372bf9
SHA25659fc1b83cc11205654e0e77888135d597ea79d28b258f11ad10f4f70db8afedd
SHA512d19e33b06193b8e5bab7e7f3d8b10c1aa6e1da7b4d8114ed8dfcf231ae4e8980c30eabea4048d1ce46938e8ebb908f3d1cb766adb55a38add5a8cbea147e85e8
-
Filesize
175KB
MD5d8ef16809d9ed53038666a123458f8c6
SHA1367a9e087defcd676c9a6dac6aa9a954b7372bf9
SHA25659fc1b83cc11205654e0e77888135d597ea79d28b258f11ad10f4f70db8afedd
SHA512d19e33b06193b8e5bab7e7f3d8b10c1aa6e1da7b4d8114ed8dfcf231ae4e8980c30eabea4048d1ce46938e8ebb908f3d1cb766adb55a38add5a8cbea147e85e8
-
\Users\Admin\AppData\Local\Temp\2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe
Filesize175KB
MD5d8ef16809d9ed53038666a123458f8c6
SHA1367a9e087defcd676c9a6dac6aa9a954b7372bf9
SHA25659fc1b83cc11205654e0e77888135d597ea79d28b258f11ad10f4f70db8afedd
SHA512d19e33b06193b8e5bab7e7f3d8b10c1aa6e1da7b4d8114ed8dfcf231ae4e8980c30eabea4048d1ce46938e8ebb908f3d1cb766adb55a38add5a8cbea147e85e8
-
\Users\Admin\AppData\Local\Temp\2bb10c361c873e4ca6182eda70de6531433f6aeba916404e9c0b94bcf96997f1mgr.exe
Filesize175KB
MD5d8ef16809d9ed53038666a123458f8c6
SHA1367a9e087defcd676c9a6dac6aa9a954b7372bf9
SHA25659fc1b83cc11205654e0e77888135d597ea79d28b258f11ad10f4f70db8afedd
SHA512d19e33b06193b8e5bab7e7f3d8b10c1aa6e1da7b4d8114ed8dfcf231ae4e8980c30eabea4048d1ce46938e8ebb908f3d1cb766adb55a38add5a8cbea147e85e8