Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2022 13:18
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
259KB
-
MD5
c6fbed69bf7f6a50dd27c2e4b5dc3607
-
SHA1
90e5b712608e74b31b7b99ce9b75465c401f47b6
-
SHA256
773123f439cd65d61c49f0593f74b94d223013d8d2341674e7ee8a514a5a156b
-
SHA512
ae455aaa304aa8e8f8bfd4459647f6e6e4875d16ffc80ac8233f5bdf1b763577bc34d6634e7e829ca20a0f2acc3fe216ce1ffec867c59465cf45d03d3424e336
-
SSDEEP
3072:/88XR1VlLhjtoLnhKr2TU/nR22iZMsnOKRwlpmsXbc2/N6gCzsakhExUVUBzsZi3:/N3LQLhKr8wQ3alpigeRkhExxzsbVmn
Malware Config
Extracted
redline
boy
77.73.134.241:4691
-
auth_value
a91fa8cc2cfaefc42a23c03faef44bd3
Extracted
raccoon
d8f44b07b06da3a90ad87ebc9249718c
http://79.137.205.87/
Signatures
-
Detect Amadey credential stealer module 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll amadey_cred_module C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exe family_redline behavioral2/memory/3284-172-0x0000000000A80000-0x0000000000AA8000-memory.dmp family_redline -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 44 2268 rundll32.exe 53 4228 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
rovwer.exelego.exerovwer.exeblockchainlzt_crypted.exemana.exe2.exerovwer.exerovwer.exepid process 2124 rovwer.exe 4348 lego.exe 5096 rovwer.exe 1464 blockchainlzt_crypted.exe 3284 mana.exe 3456 2.exe 4828 rovwer.exe 1604 rovwer.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exerovwer.exelego.exerovwer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation rovwer.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation lego.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation rovwer.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2268 rundll32.exe 4228 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
rovwer.exerovwer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mana.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000007001\\mana.exe" rovwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000041001\\2.exe" rovwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lego.exe = "C:\\Users\\Admin\\AppData\\Roaming\\1000006000\\lego.exe" rovwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\blockchainlzt_crypted.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000038001\\blockchainlzt_crypted.exe" rovwer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
blockchainlzt_crypted.exedescription pid process target process PID 1464 set thread context of 224 1464 blockchainlzt_crypted.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4084 3172 WerFault.exe file.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4132 schtasks.exe 1236 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
mana.exerundll32.exerundll32.exepid process 3284 mana.exe 3284 mana.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe 4228 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
mana.exedescription pid process Token: SeDebugPrivilege 3284 mana.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
file.exerovwer.exelego.exerovwer.execmd.exeblockchainlzt_crypted.exedescription pid process target process PID 3172 wrote to memory of 2124 3172 file.exe rovwer.exe PID 3172 wrote to memory of 2124 3172 file.exe rovwer.exe PID 3172 wrote to memory of 2124 3172 file.exe rovwer.exe PID 2124 wrote to memory of 4132 2124 rovwer.exe schtasks.exe PID 2124 wrote to memory of 4132 2124 rovwer.exe schtasks.exe PID 2124 wrote to memory of 4132 2124 rovwer.exe schtasks.exe PID 2124 wrote to memory of 4348 2124 rovwer.exe lego.exe PID 2124 wrote to memory of 4348 2124 rovwer.exe lego.exe PID 2124 wrote to memory of 4348 2124 rovwer.exe lego.exe PID 4348 wrote to memory of 5096 4348 lego.exe rovwer.exe PID 4348 wrote to memory of 5096 4348 lego.exe rovwer.exe PID 4348 wrote to memory of 5096 4348 lego.exe rovwer.exe PID 5096 wrote to memory of 1236 5096 rovwer.exe schtasks.exe PID 5096 wrote to memory of 1236 5096 rovwer.exe schtasks.exe PID 5096 wrote to memory of 1236 5096 rovwer.exe schtasks.exe PID 5096 wrote to memory of 392 5096 rovwer.exe cmd.exe PID 5096 wrote to memory of 392 5096 rovwer.exe cmd.exe PID 5096 wrote to memory of 392 5096 rovwer.exe cmd.exe PID 392 wrote to memory of 4952 392 cmd.exe cmd.exe PID 392 wrote to memory of 4952 392 cmd.exe cmd.exe PID 392 wrote to memory of 4952 392 cmd.exe cmd.exe PID 392 wrote to memory of 2340 392 cmd.exe cacls.exe PID 392 wrote to memory of 2340 392 cmd.exe cacls.exe PID 392 wrote to memory of 2340 392 cmd.exe cacls.exe PID 392 wrote to memory of 1084 392 cmd.exe cacls.exe PID 392 wrote to memory of 1084 392 cmd.exe cacls.exe PID 392 wrote to memory of 1084 392 cmd.exe cacls.exe PID 392 wrote to memory of 1956 392 cmd.exe cmd.exe PID 392 wrote to memory of 1956 392 cmd.exe cmd.exe PID 392 wrote to memory of 1956 392 cmd.exe cmd.exe PID 392 wrote to memory of 4596 392 cmd.exe cacls.exe PID 392 wrote to memory of 4596 392 cmd.exe cacls.exe PID 392 wrote to memory of 4596 392 cmd.exe cacls.exe PID 392 wrote to memory of 2164 392 cmd.exe cacls.exe PID 392 wrote to memory of 2164 392 cmd.exe cacls.exe PID 392 wrote to memory of 2164 392 cmd.exe cacls.exe PID 5096 wrote to memory of 1464 5096 rovwer.exe blockchainlzt_crypted.exe PID 5096 wrote to memory of 1464 5096 rovwer.exe blockchainlzt_crypted.exe PID 5096 wrote to memory of 1464 5096 rovwer.exe blockchainlzt_crypted.exe PID 1464 wrote to memory of 224 1464 blockchainlzt_crypted.exe AppLaunch.exe PID 1464 wrote to memory of 224 1464 blockchainlzt_crypted.exe AppLaunch.exe PID 1464 wrote to memory of 224 1464 blockchainlzt_crypted.exe AppLaunch.exe PID 1464 wrote to memory of 224 1464 blockchainlzt_crypted.exe AppLaunch.exe PID 2124 wrote to memory of 3284 2124 rovwer.exe mana.exe PID 2124 wrote to memory of 3284 2124 rovwer.exe mana.exe PID 2124 wrote to memory of 3284 2124 rovwer.exe mana.exe PID 1464 wrote to memory of 224 1464 blockchainlzt_crypted.exe AppLaunch.exe PID 5096 wrote to memory of 3456 5096 rovwer.exe 2.exe PID 5096 wrote to memory of 3456 5096 rovwer.exe 2.exe PID 5096 wrote to memory of 3456 5096 rovwer.exe 2.exe PID 2124 wrote to memory of 2268 2124 rovwer.exe rundll32.exe PID 2124 wrote to memory of 2268 2124 rovwer.exe rundll32.exe PID 2124 wrote to memory of 2268 2124 rovwer.exe rundll32.exe PID 5096 wrote to memory of 4228 5096 rovwer.exe rundll32.exe PID 5096 wrote to memory of 4228 5096 rovwer.exe rundll32.exe PID 5096 wrote to memory of 4228 5096 rovwer.exe rundll32.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\1000006000\lego.exe"C:\Users\Admin\AppData\Roaming\1000006000\lego.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:R" /E6⤵
-
C:\Users\Admin\AppData\Local\Temp\1000038001\blockchainlzt_crypted.exe"C:\Users\Admin\AppData\Local\Temp\1000038001\blockchainlzt_crypted.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\1000041001\2.exe"C:\Users\Admin\AppData\Local\Temp\1000041001\2.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
-
C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exe"C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 11362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3172 -ip 31721⤵
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exeFilesize
137KB
MD5e63d74cec6926b2d04e474b889d08af4
SHA1a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb
SHA256a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33
SHA512fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148
-
C:\Users\Admin\AppData\Local\Temp\1000007001\mana.exeFilesize
137KB
MD5e63d74cec6926b2d04e474b889d08af4
SHA1a64a888ccfb4e82ade71f1a00a7ae681d29c7bcb
SHA256a9ffffff38aca59d7d2f041fbdb253ca612c7ba2d597782b2e6a59a914f49b33
SHA512fd59c0a1c613611002e52a309ee4baad626df8fbbd8c0c230bcb8e6fed4a3059296ab11b88a1d25a0f54c65f730a027f876629298120f7b4c251bf6d2aaed148
-
C:\Users\Admin\AppData\Local\Temp\1000038001\blockchainlzt_crypted.exeFilesize
2.7MB
MD5e7f46144892fe5bdef99bdf819d1b9a6
SHA1763ac1ea8c3de617457f64a8ce4eabe7ab8a3abb
SHA256e252a54e441ea88aafa694259386afd002153481af25a5b7b2df46d17ac53fcc
SHA5120165fe66620ef9c621b1f3b37e5ef69d636f4f6ec341011d9d6b45fdf9b634151937c139e928b8641183ff2f469844a1370a4ac0253d84ec81992cd9c67b963f
-
C:\Users\Admin\AppData\Local\Temp\1000038001\blockchainlzt_crypted.exeFilesize
2.7MB
MD5e7f46144892fe5bdef99bdf819d1b9a6
SHA1763ac1ea8c3de617457f64a8ce4eabe7ab8a3abb
SHA256e252a54e441ea88aafa694259386afd002153481af25a5b7b2df46d17ac53fcc
SHA5120165fe66620ef9c621b1f3b37e5ef69d636f4f6ec341011d9d6b45fdf9b634151937c139e928b8641183ff2f469844a1370a4ac0253d84ec81992cd9c67b963f
-
C:\Users\Admin\AppData\Local\Temp\1000041001\2.exeFilesize
57KB
MD55cef736542d8707af28a2927bb0a09c2
SHA1415816c04d498480ef350db4d77651dc17791897
SHA256c73eef378eb054a400fb8163dd3141feaffea91eeb6a1363a41e7e7a88222f53
SHA5129cc502bbe2ffaadc7de2f2ac6aaaadbd1911de0ab6c02420c029041001aa3e649592b0b61e825eb9033147bb47424374181a341586b96128aa1307214a6a3f38
-
C:\Users\Admin\AppData\Local\Temp\1000041001\2.exeFilesize
57KB
MD55cef736542d8707af28a2927bb0a09c2
SHA1415816c04d498480ef350db4d77651dc17791897
SHA256c73eef378eb054a400fb8163dd3141feaffea91eeb6a1363a41e7e7a88222f53
SHA5129cc502bbe2ffaadc7de2f2ac6aaaadbd1911de0ab6c02420c029041001aa3e649592b0b61e825eb9033147bb47424374181a341586b96128aa1307214a6a3f38
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeFilesize
259KB
MD5c6fbed69bf7f6a50dd27c2e4b5dc3607
SHA190e5b712608e74b31b7b99ce9b75465c401f47b6
SHA256773123f439cd65d61c49f0593f74b94d223013d8d2341674e7ee8a514a5a156b
SHA512ae455aaa304aa8e8f8bfd4459647f6e6e4875d16ffc80ac8233f5bdf1b763577bc34d6634e7e829ca20a0f2acc3fe216ce1ffec867c59465cf45d03d3424e336
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeFilesize
259KB
MD5c6fbed69bf7f6a50dd27c2e4b5dc3607
SHA190e5b712608e74b31b7b99ce9b75465c401f47b6
SHA256773123f439cd65d61c49f0593f74b94d223013d8d2341674e7ee8a514a5a156b
SHA512ae455aaa304aa8e8f8bfd4459647f6e6e4875d16ffc80ac8233f5bdf1b763577bc34d6634e7e829ca20a0f2acc3fe216ce1ffec867c59465cf45d03d3424e336
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
241KB
MD5b466f58861bb4069db99312de146a2e8
SHA1295f06794b26ba5ac7c73fbf636c581624f897cd
SHA2566cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420
SHA5128693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
241KB
MD5b466f58861bb4069db99312de146a2e8
SHA1295f06794b26ba5ac7c73fbf636c581624f897cd
SHA2566cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420
SHA5128693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
241KB
MD5b466f58861bb4069db99312de146a2e8
SHA1295f06794b26ba5ac7c73fbf636c581624f897cd
SHA2566cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420
SHA5128693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
241KB
MD5b466f58861bb4069db99312de146a2e8
SHA1295f06794b26ba5ac7c73fbf636c581624f897cd
SHA2566cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420
SHA5128693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d
-
C:\Users\Admin\AppData\Roaming\1000006000\lego.exeFilesize
241KB
MD5b466f58861bb4069db99312de146a2e8
SHA1295f06794b26ba5ac7c73fbf636c581624f897cd
SHA2566cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420
SHA5128693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d
-
C:\Users\Admin\AppData\Roaming\1000006000\lego.exeFilesize
241KB
MD5b466f58861bb4069db99312de146a2e8
SHA1295f06794b26ba5ac7c73fbf636c581624f897cd
SHA2566cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420
SHA5128693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
126KB
MD5507e9dc7b9c42f535b6df96d79179835
SHA1acf41fb549750023115f060071aa5ca8c33f249e
SHA2563b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af
SHA51270907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
126KB
MD5507e9dc7b9c42f535b6df96d79179835
SHA1acf41fb549750023115f060071aa5ca8c33f249e
SHA2563b82a0ea49d855327b64073872ebb6b63eee056e182be6b1935aa512628252af
SHA51270907ec4c395b0d2219bfe98907ec130bfcbc6d4bec7bd73965a9b1e422553e27daaead3d6647620fcf5392d85a2e975bce0f7c79c0bc665dd33ce65f7d44302
-
C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dllFilesize
126KB
MD5b8d80046e28849a320a3dcd868b73d7c
SHA1f15bc4a4c5189e7aa845213469c6def5afd68186
SHA256d23147a448d24f81d81d4bb226f3fc968386792c0987dda75917104b5ecd9d5a
SHA512b7f6d59ee55d2b579c2185560d2e660c1952f9214f3db3096b1358af3559fd985859aa3389be333c826f35b85cd63c6f65a03e65a7ad57c7834bb09abd1d853e
-
C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dllFilesize
126KB
MD5b8d80046e28849a320a3dcd868b73d7c
SHA1f15bc4a4c5189e7aa845213469c6def5afd68186
SHA256d23147a448d24f81d81d4bb226f3fc968386792c0987dda75917104b5ecd9d5a
SHA512b7f6d59ee55d2b579c2185560d2e660c1952f9214f3db3096b1358af3559fd985859aa3389be333c826f35b85cd63c6f65a03e65a7ad57c7834bb09abd1d853e
-
memory/224-170-0x00000000005A0000-0x0000000000799000-memory.dmpFilesize
2.0MB
-
memory/224-158-0x0000000000000000-mapping.dmp
-
memory/224-161-0x00000000005A0000-0x0000000000799000-memory.dmpFilesize
2.0MB
-
memory/224-160-0x00000000005A1000-0x0000000000684000-memory.dmpFilesize
908KB
-
memory/392-148-0x0000000000000000-mapping.dmp
-
memory/1084-151-0x0000000000000000-mapping.dmp
-
memory/1236-147-0x0000000000000000-mapping.dmp
-
memory/1464-155-0x0000000000000000-mapping.dmp
-
memory/1956-152-0x0000000000000000-mapping.dmp
-
memory/2124-139-0x0000000000608000-0x0000000000627000-memory.dmpFilesize
124KB
-
memory/2124-140-0x0000000000400000-0x000000000059C000-memory.dmpFilesize
1.6MB
-
memory/2124-177-0x0000000000608000-0x0000000000627000-memory.dmpFilesize
124KB
-
memory/2124-132-0x0000000000000000-mapping.dmp
-
memory/2124-178-0x0000000000400000-0x000000000059C000-memory.dmpFilesize
1.6MB
-
memory/2164-154-0x0000000000000000-mapping.dmp
-
memory/2268-190-0x0000000000000000-mapping.dmp
-
memory/2340-150-0x0000000000000000-mapping.dmp
-
memory/3172-137-0x0000000000400000-0x000000000059C000-memory.dmpFilesize
1.6MB
-
memory/3172-135-0x0000000000609000-0x0000000000628000-memory.dmpFilesize
124KB
-
memory/3172-136-0x0000000000710000-0x000000000074E000-memory.dmpFilesize
248KB
-
memory/3284-173-0x00000000059A0000-0x0000000005FB8000-memory.dmpFilesize
6.1MB
-
memory/3284-186-0x0000000006620000-0x0000000006670000-memory.dmpFilesize
320KB
-
memory/3284-163-0x0000000000000000-mapping.dmp
-
memory/3284-175-0x0000000005430000-0x0000000005442000-memory.dmpFilesize
72KB
-
memory/3284-174-0x0000000005500000-0x000000000560A000-memory.dmpFilesize
1.0MB
-
memory/3284-182-0x00000000058C0000-0x0000000005926000-memory.dmpFilesize
408KB
-
memory/3284-183-0x0000000006360000-0x00000000063F2000-memory.dmpFilesize
584KB
-
memory/3284-184-0x00000000069B0000-0x0000000006F54000-memory.dmpFilesize
5.6MB
-
memory/3284-185-0x00000000065A0000-0x0000000006616000-memory.dmpFilesize
472KB
-
memory/3284-176-0x0000000005490000-0x00000000054CC000-memory.dmpFilesize
240KB
-
memory/3284-187-0x0000000006F60000-0x0000000007122000-memory.dmpFilesize
1.8MB
-
memory/3284-188-0x0000000007660000-0x0000000007B8C000-memory.dmpFilesize
5.2MB
-
memory/3284-172-0x0000000000A80000-0x0000000000AA8000-memory.dmpFilesize
160KB
-
memory/3456-179-0x0000000000000000-mapping.dmp
-
memory/4132-138-0x0000000000000000-mapping.dmp
-
memory/4228-193-0x0000000000000000-mapping.dmp
-
memory/4348-141-0x0000000000000000-mapping.dmp
-
memory/4596-153-0x0000000000000000-mapping.dmp
-
memory/4952-149-0x0000000000000000-mapping.dmp
-
memory/5096-144-0x0000000000000000-mapping.dmp