Analysis
-
max time kernel
93s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/01/2025, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe
Resource
win7-20241023-en
General
-
Target
abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe
-
Size
216KB
-
MD5
04da68ccae7faa684abfc3bc0b58cb40
-
SHA1
3df3a4e5a8c7226080c62db1eaafc01ad8d6a9a3
-
SHA256
abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510
-
SHA512
197a4598b306e07473ee634d68b684ca094cb9021c9690875d3a2205d44ce46ae5ac8ebe82377744540d34ab46d720b3c277a8d041c69caf783733b587e35a29
-
SSDEEP
3072:Ol6EgmJBkSju7dMIplpdWnWf1WYCPTkG8M8kkRqX66poLD8x8VnvupmYmcNovxC:O3BPju7B3zjNWlIG88k666qfVUFOpC
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 4532 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe 4220 WaterMark.exe -
resource yara_rule behavioral2/memory/4532-6-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4532-5-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4532-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4532-12-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4532-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4532-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4220-21-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4220-26-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\WaterMark.exe abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe File opened for modification C:\Program Files (x86)\Microsoft\pxAF89.tmp abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4212 3468 WerFault.exe 88 1816 3712 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443765018" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1237054304" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{75310672-D3BE-11EF-ADF2-CAFD856C81B1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31156171" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{752EA46A-D3BE-11EF-ADF2-CAFD856C81B1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31156171" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31156171" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31156171" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1235804327" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1235804327" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1237054304" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe 4220 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4220 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1032 iexplore.exe 4988 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4988 iexplore.exe 4988 iexplore.exe 1032 iexplore.exe 1032 iexplore.exe 3360 IEXPLORE.EXE 3360 IEXPLORE.EXE 376 IEXPLORE.EXE 376 IEXPLORE.EXE 3360 IEXPLORE.EXE 3360 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4532 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe 4220 WaterMark.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3712 wrote to memory of 4532 3712 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 86 PID 3712 wrote to memory of 4532 3712 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 86 PID 3712 wrote to memory of 4532 3712 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 86 PID 4532 wrote to memory of 4220 4532 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe 87 PID 4532 wrote to memory of 4220 4532 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe 87 PID 4532 wrote to memory of 4220 4532 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe 87 PID 4220 wrote to memory of 3468 4220 WaterMark.exe 88 PID 4220 wrote to memory of 3468 4220 WaterMark.exe 88 PID 4220 wrote to memory of 3468 4220 WaterMark.exe 88 PID 4220 wrote to memory of 3468 4220 WaterMark.exe 88 PID 4220 wrote to memory of 3468 4220 WaterMark.exe 88 PID 4220 wrote to memory of 3468 4220 WaterMark.exe 88 PID 4220 wrote to memory of 3468 4220 WaterMark.exe 88 PID 4220 wrote to memory of 3468 4220 WaterMark.exe 88 PID 4220 wrote to memory of 3468 4220 WaterMark.exe 88 PID 4220 wrote to memory of 4988 4220 WaterMark.exe 94 PID 4220 wrote to memory of 4988 4220 WaterMark.exe 94 PID 4220 wrote to memory of 1032 4220 WaterMark.exe 95 PID 4220 wrote to memory of 1032 4220 WaterMark.exe 95 PID 4988 wrote to memory of 376 4988 iexplore.exe 96 PID 4988 wrote to memory of 376 4988 iexplore.exe 96 PID 4988 wrote to memory of 376 4988 iexplore.exe 96 PID 1032 wrote to memory of 3360 1032 iexplore.exe 97 PID 1032 wrote to memory of 3360 1032 iexplore.exe 97 PID 1032 wrote to memory of 3360 1032 iexplore.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe"C:\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exeC:\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 2045⤵
- Program crash
PID:4212
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4988 CREDAT:17410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:376
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:17410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3360
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 3562⤵
- Program crash
PID:1816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3468 -ip 34681⤵PID:492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3712 -ip 37121⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD59e22a9c34466faf7bc9cf642444b3f30
SHA10ac45262532cce40083cc9049fb12d4efb06c01f
SHA25657569469879a3144b391cf9def258ad9ef29d7fd1d3d70a28cfb506443d7a119
SHA512c60649fb0ecdd14c9a6d8f9ea7ac4356b24a5e1a238705bbc8294b72ea2fda21965af200746ae20dd5f45e386fc30e2189de6007e08ff3d7ec72b8dfc39435fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5d03ba290d695a6bcc5b71c3186e39c74
SHA1595c809e8b71dc8402b93f841b6872e21fb5696c
SHA25600ef615d26874dbdf8dd9b81ecf10c8a2f152f524d8249366a07052022b5f12d
SHA512014519b045fd78665c94f86a07f7b4cc1190f872eafc118d6ebeab88d1f1c2eff19155d6e659f6987abb09ac9699b2c5ea30bce57ed2f8985246f4197f9bd49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD59b3d9eb052ca115097b0f6eec45ae7d3
SHA10ce5b5272c1bb6c5ae5a6f671f100b7853f9067f
SHA256192afa7a1758008a79515e8928326c37c12d38d882d16d358d66c6dc98718646
SHA512668788c4c126de344916bda4222bcdfe98b5e781179a9d775a8fad296db6c254fb65a8cb17d176e7e38bdc9d98cc0045e700226aaae8d8a90c5dc9284869e491
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{752EA46A-D3BE-11EF-ADF2-CAFD856C81B1}.dat
Filesize3KB
MD5e714407ad07d2ee1a05d78ad66ace58c
SHA15d70d017a410a92de67979f8fc21cad67fc9a4a7
SHA256a3dcc2b843fc43396171e4101f72ece0773055fdcd85372d6991278ccca0885e
SHA51213c3bbbeb860f9d4c6f952d8b73e693161822b5fb793ba93c6f4cf811a545d45ec4472e8ebdd2625aa65af6ecdf776289194da48e55b6a0b96da6e0d015e6993
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{75310672-D3BE-11EF-ADF2-CAFD856C81B1}.dat
Filesize5KB
MD54bfea7a49ebdc3858e15eb2e94686557
SHA1edc19c3d9bed1ec32a0b0e9a968ee49c424fe734
SHA25694c122e8199444f2595a91a91df953e92afcfa5021b15c047906fb65c56b89a9
SHA512a8f3145085d931b123aafcf9e41ea5e01cea89b2821a3fc198ddbbdcc4554b34fa00edc191b1c4dc995e2ebe30439a144c9d29fc4bccab17f3a22834d9b9f829
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe
Filesize59KB
MD5a2140ffa40095f183b9391c0d3173462
SHA1114f9b32c8c3b443bc6b6d136e5367160f04597d
SHA256a816e9d9ac773fc178756269ac79c93f61c33b8f4c92fca08e89b1eb31fe2b53
SHA512037ff28bb852c8ded8c8a980b65e32eaad8f6a3bd33fb122f097507bc4a756b4c34b8bc37ffa581ed21e29de21a84af279f5fc6cfecf87e5d4bd2bc955d4804b