Analysis
-
max time kernel
135s -
max time network
138s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-05-2024 16:18
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win11-20240508-en
General
-
Target
file.html
-
Size
176KB
-
MD5
2ff1852db050e32514899d5423e50d22
-
SHA1
feacdd8c39e8000877aaffff79384c794457219c
-
SHA256
5ae70117eb8fd79cfc11253b382d2104d47199c776dfcd446d5f74d697d09f2c
-
SHA512
90f074f6540300b5920b0fe1c7680f2376f3b79004959c95c81a9d542b7fb3948f125b66cf24325fc773ce23dafd1f0c8f1d25f6434cdeda01f3a53ce61ef0ff
-
SSDEEP
1536:MivUa50ZoTgAJuHnjde83Ml83Mn1CyKBKyf6C9XS6zmFMtMd5/an/0l6A1cazJe/:Mi3gAkHnjPIQ6KSEX/LHjJ46K4
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1408-1640-0x0000000000400000-0x000000000044A000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
7z2405-x64.exe7zFM.exeAxoPac.exeAxoPac.exepid process 2760 7z2405-x64.exe 3012 7zFM.exe 1868 AxoPac.exe 2008 AxoPac.exe -
Loads dropped DLL 2 IoCs
Processes:
7zFM.exepid process 3012 7zFM.exe 3252 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
7z2405-x64.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2405-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2405-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2405-x64.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
AxoPac.exeAxoPac.exedescription pid process target process PID 1868 set thread context of 1408 1868 AxoPac.exe RegAsm.exe PID 2008 set thread context of 4520 2008 AxoPac.exe RegAsm.exe -
Drops file in Program Files directory 64 IoCs
Processes:
7z2405-x64.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7-zip32.dll 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\7z.dll 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\descript.ion 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\License.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tg.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\History.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\readme.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 7z2405-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt 7z2405-x64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 928 1868 WerFault.exe AxoPac.exe 1152 2008 WerFault.exe AxoPac.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133612139621940278" chrome.exe -
Modifies registry class 64 IoCs
Processes:
7z2405-x64.exeOpenWith.exeMiniSearchHost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2405-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2405-x64.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Applications\7zFM.exe\shell\open OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2405-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2405-x64.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2405-x64.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 19002f433a5c000000000000000000000000000000000000000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\0\NodeSlot = "4" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\0\MRUListEx = ffffffff OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip 7z2405-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2405-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip 7z2405-x64.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0 = 8c00310000000000a858396b110050524f4752417e310000740009000400efbec5525961ba585b822e0000003f0000000000010000000000000000004a00000000006444da00500072006f006700720061006d002000460069006c0065007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003100000018000000 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Applications OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip 7z2405-x64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Applications\7zFM.exe\shell\open\command\ = "\"C:\\Program Files\\7-Zip\\7zFM.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2405-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2405-x64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2405-x64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = 00000000ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Applications\7zFM.exe OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2405-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip 7z2405-x64.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\0 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2405-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2405-x64.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\0 = 5000310000000000a8580b6a1000372d5a6970003c0009000400efbea8580b6aba586d822e000000839f020000001c000000000000000000000000000000fab9aa0037002d005a0069007000000014000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Applications\7zFM.exe\shell OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2405-x64.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\MRUListEx = 00000000ffffffff OpenWith.exe -
NTFS ADS 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\AxoPac.rar:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exeRegAsm.exeRegAsm.exepid process 1032 chrome.exe 1032 chrome.exe 1408 RegAsm.exe 1408 RegAsm.exe 1408 RegAsm.exe 4520 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
OpenWith.exe7zFM.exepid process 3160 OpenWith.exe 3012 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exepid process 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
MiniSearchHost.exe7z2405-x64.exeOpenWith.exepid process 4284 MiniSearchHost.exe 2760 7z2405-x64.exe 3160 OpenWith.exe 3160 OpenWith.exe 3160 OpenWith.exe 3160 OpenWith.exe 3160 OpenWith.exe 3160 OpenWith.exe 3160 OpenWith.exe 3160 OpenWith.exe 3160 OpenWith.exe 3160 OpenWith.exe 3160 OpenWith.exe 3160 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1032 wrote to memory of 2436 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 2436 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 644 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 2364 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 2364 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe PID 1032 wrote to memory of 4972 1032 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcaca0ab58,0x7ffcaca0ab68,0x7ffcaca0ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2140 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4652 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5116 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5148 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5168 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5440 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5480 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:82⤵
- NTFS ADS
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=6124 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5868 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5956 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 --field-trial-handle=1796,i,11297346431132409680,3765407582565813227,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Downloads\7z2405-x64.exe"C:\Users\Admin\Downloads\7z2405-x64.exe"1⤵
- Executes dropped EXE
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\AxoPac.rar"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\Desktop\AxoPac\AxoPac.exe"C:\Users\Admin\Desktop\AxoPac\AxoPac.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 3122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1868 -ip 18681⤵
-
C:\Users\Admin\Desktop\AxoPac\AxoPac.exe"C:\Users\Admin\Desktop\AxoPac\AxoPac.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 2322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2008 -ip 20081⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\7-Zip\7-zip.dllFilesize
99KB
MD53428b9967f63c00213d6dbdb27973996
SHA11cf56abc2e0b71f5a927ea230c8cca073d20fc97
SHA25656008756553ea5876fb8aad98f6f5dbca1ba14c5e53f4fa9ec318e355e146a7e
SHA512b876b39d030818ce7879eb9bb5ff4375712cf145b7457a815880bf010215bd9dcde539e7d0877c56558e0d23a310bc75bfb9d315f9966cbda4ae02a7821980cc
-
C:\Program Files\7-Zip\7z.dllFilesize
1.8MB
MD52537a4ba91cb5ad22293b506ad873500
SHA1ce3f4a90278206b33f037eaf664a5fbc39089ec4
SHA2565529fdc4e6385ad95106a4e6da1d2792046a71c9d7452ee6cbc8012b4eb8f3f4
SHA5127c02445d8a9c239d31f1c14933d75b3e731ed4c5f21a0ecf32d1395be0302e50aab5eb2df3057f3e9668f4b8ec0ccbed533cd54bc36ee1ada4cc5098cc0cfb14
-
C:\Program Files\7-Zip\7z.exeFilesize
548KB
MD5e1e36ca1443a94afda63fff08db41d9e
SHA1e003b8b4ad6b024c808f422b8e09257811c55ec5
SHA256fcdf41ab5a749e82575d36365bf11e8ce9b52d05c9058cd3589c8c2c8c4f59f5
SHA51299df04b41492108af134ab67964584e07549a1ed32329815e1f9814e5cbaf6c3ee72b3d9fd17b30347d8e22009b489f7329ed48e25422cdaf1a3775515435b6a
-
C:\Program Files\7-Zip\7zFM.exeFilesize
960KB
MD5b161d842906239bf2f32ad158bea57f1
SHA14a125d6cbeae9658e862c637aba8f8b9f3bf5cf7
SHA2563345c48505e0906f1352499ba7cbd439ac0c509a33f04c7d678e2c960c8b9f03
SHA5120d14c75c8e80af8246ddf122052190f5ffb1f81ffd5b752990747b7efcb566b49842219d9b26df9dbe267c9a3876d7b60158c9f08d295d0926b60dbbebc1fa3c
-
C:\Program Files\7-Zip\7zG.exeFilesize
691KB
MD5ebff295ea5bb139eb04c699e1a52c286
SHA14d71053397304ab545f246ed6676d5927691b833
SHA256835d114678b311e938ee235519be252b38f14f2c5117d3ee3b905f09f0615f94
SHA5124320277436d737efb3ea04515a52ec86102a02f840b2f16d8f27673244124e149f01eee15870448710ec015c103a83f8bbf491f9928dbc1bc1b55236da8473b9
-
C:\Program Files\7-Zip\Uninstall.exeFilesize
14KB
MD51fed34eef8fb1602f7a99b89c9c0a748
SHA12b5cfb493170f07ad821e8b081e19c5ffaaa6a97
SHA2564ae9acd4a1764f640ef24e35373c3397485a4cdb6a25287a7f701fe7b7ca47bf
SHA512ee9bdfcb04c7c159bf2ad4b3434481b980f1dfcf5780f95295e310b1093e965743c705fe21e4c4b493df5f3b82d621ec5c466cf0ed35c3cd2987fbba12b2adb2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\77da2f8f-8b99-49ee-901d-7904a085faa3.tmpFilesize
7KB
MD58f93d29f3f6a9692a10e9c8d429601ed
SHA19be7904e8a7b9b6dcdd11c6b2e3fef7f440defea
SHA2560f99b7bee6a054b79ca874e17eb490868779680ec15790b5563fc01781812989
SHA512c9aec680e39370f492c3b6a55d18f38798ccd1b3f229bb293f0437f202d73768eef5b7715721e3452cf50c34ebf214437391300491eaee379c73505721fb9e8d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
432B
MD5a47b41c69ba68a0fd425072b4227bb67
SHA12c350f6fd226ee1d628c67c305c12016b292368e
SHA25600a60629f186c948e35c93012c60121848d6d44716dd189936514835d3df3b69
SHA5127c7a1e43f8bb9f21f7e1e8b1dbc75493c66f0200e7d9ef9854330fb6de8b23483307e4ec2df72f0439b3b477ec49acaf56a2a299eb716a8b08fb307355f74452
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesFilesize
20KB
MD549333079e7b66ca774ad47344cdbe091
SHA18a32acd54c5ea6e5f09c0cbb9dcb80f5a417b9ac
SHA2561062099711470740ab7a1188be18657dfe576d54b4c06fbcffb850ae732d6f4d
SHA512f1d534bbaa5b74214cfa081c3c0d0e323576f5eb27d3ab5d9b6b5496280ab38916c5057258222971be095e1d9c0b110f74e1e8ad250f9a8e9b42a46389199c3d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
4KB
MD50b7f6a957cb89e2b200b444f26419dbc
SHA179c7522b65da8945295aa4a3f84ca150ab690be7
SHA25672cdc63704e491dd095b1c601328481975b2d32f6edeb18e35c6c9e79fc0c882
SHA5125700a126453e727ab570964052a446977855a265b5f3b456ef21d36f296fbf7158e899a8d7452d74a5811b45ae940ada3bb7b40e41d3fabd47e9496e0e8a8642
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
4KB
MD53181f1f7d9f3c46b8d6dc2b43bdf6180
SHA1499ab71d294caf61e3700b52ac6d70547e1ec5fa
SHA256111fd0a66f5cd8a0dd7dd604269f846f2f38ef7aac7fbaec0252501c341c15a0
SHA51246d0d68930da5b1d4f51f0e612372d9e01d189a957c700202c4672da6ab73f0d703a58f5516ba55fa3cfe2aea00c01c9cb3d672e3a141f083db63371a5644a83
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5238861ec99e95634e625e534176d5eb9
SHA15b55f671d2d7402ddef9f7bb9b75c8b7422da49c
SHA25607732a5bafc185c09bd440eced25b5d3078f146e857ce8c5eefeca1e33c03c97
SHA512d071c446e334eec7c80240a91fe85db628ead487323e6935ad52af72d1aeee2cdcb20ac780409469a72772c5134a899ed69a65d83de3c276ac8820c6f654dbe1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
858B
MD547beae81797ff3b92cb54872aaf7b866
SHA1398523da4d2c24c5239095febd9ff89342ab9808
SHA256441e4c8c5fa481eb0596eaa87288d411bd5fb00f96739007392313280ce75e30
SHA51226b162b2395fe5a0069b926b702f4b81c57abe973a77d50adb9f7ffad79720c3808245b73694872e122015ada649602d3726f1953e8493119d507317206fd70e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
858B
MD5045fdcd133c8be48d74e4866dac7d95f
SHA13325480d8b9f7abe289280a5cf035593f1728882
SHA2567e12527149cd9d92cc7426644caf30d8301882a85a30bffd258801c42257421d
SHA5125e48f56a8c84d91021aa2eeb34f5b459afaf5833d464914bd637d2f0205c205410b12730b071569b84fe68dd45bdaf9791cda727bd05ba7b5c92c4d7a3793aaa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5faa7581324bffe8df11422ed6fb184f9
SHA1571b4eb3f0fd975c96254ad8ac565c021585587b
SHA2565dea3eb3efe2dc9cc178621d1d5fbb32989e11f64d33cea219e63407d22bf872
SHA51280fbd2ca9b2bfe16c45e8a3f80704d79a237995cb26d81e1b65861c5dd4d01905a83bc30ef1bd59e61a0ca937a2cc5900aae0798dae0fce2906dbc6e1fe421d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5d8a2427e94c94bde80d193abb9133a9e
SHA1c06a9b2d14f9eef871a65f269e24719487aa664c
SHA2562c58e427263fa79da5cb5bea012942560762c02d025947d2e13375177b0a19c2
SHA512c795ef8a03b9ecdeff9b8fb9299ed9601fefbdcf8b8b595cd7f3eb4f4ac800c1dfef03b81525bf6901787fea8014fb5473f8880f8fe7337a1b377bc01d125a97
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5f86f0e2c3158c0b8da60ade297e93bd1
SHA1a98155598498e145f971caf42bc0fa1e72430594
SHA256d7024afb46b465d2e6cf317b9a6515039efd36e62543f31c29a8eaa1705c0710
SHA5121f5e7d059e8c83f19a5a9e8aef572414186e6fd9d173ca06d267e7d2abcda0e964160c3d21ef0b88cf86ea71c35edb69b8e1df117a7098c1b95863f79b09c739
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web DataFilesize
100KB
MD5cbc7ff32a91581d2d0774064e8de4694
SHA1f35bba10420f3bea7817564228377364e2289eaa
SHA2562ae5758993557777d852c19f6bb52c9e108ae829a928ca008689cb6f0a59f1a4
SHA512f1795b100509447e7d47343345505597a924f71c3811e2c1b032beef3c6841cd782c6d958c294d419fe26ee5788d0790bb410763540d9045a0a4072b01e6a623
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
129KB
MD560a9b632151f54aba0e88ae9b131178c
SHA1ecf8b7e676d9bdc163acd087f735fd949034f155
SHA2568680ca1486eb1eed0b20d1556be2cfb28e243037e8556586e32a446ef6058e9e
SHA51252e5d84f57f9b0a90d05c29d24264145077188bf857c7fcc77e5ee20c6a27e18909e24791dd3a8c7a432a355b270e41adadf809b2b1f10212d5d5696893cf785
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
129KB
MD54b91f26db779dcffa81a39fc63e29bf8
SHA1596fe380398dd5645e045c60eca3b04026fd6b1c
SHA25664c6ede67188e134ce7852cc5e3d99c92e9d5a550e11f2424894ac5db83adc16
SHA512988967edcb4439e9451d29bd8f703eefd33347191466e82e34995f8747905dbcd7f7b1d2fae181f5fb91360c53beb5f58c60e73a423c275cfa9e9cfbec7e812f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
129KB
MD5a091c75c4221d0a028ae66717dcc8001
SHA1ff7dfffe0062e40656d5b2b676a83149af43cdfa
SHA256f444ec103738643f0d317b4e9a2ce732c041cc98ec27b72a213c60f91d3b60db
SHA5123a97a884ad0959b2e017b214a6f6b2d2f4ae3be12b149b658d08c2d26538ac471d956946cf2664bc301f735e3b5d1d5add3750847aa36fa7cd38b7c80185c589
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1Filesize
264KB
MD50e17d8d0828cf70bea8201918abd611c
SHA180d756c52f600787c37fc596a72d60d543720a10
SHA256f76692a4908b704579cf14fe1e9e11c91ba1a16696add45d2a52c5a1714227ea
SHA5120bdd9882441f5a13d9e02ee0843b52fc58c96e4b4615ec878fc15b9fbd2756d07127a1b23bc0ad5c2701f7869d4757ac3f4659753a670f1131e28c37dcdb57e9
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.logFilesize
2KB
MD5661cf82d7ff5c760912b43f583c59aa5
SHA1924bacd9bb4e0f5f985b4f98bcd4a83a46775497
SHA256e85f98a486bee3b77e4c15d304d2209d3944ec6e3ac2faadf68ba176edfa64ae
SHA51244db890cc597390afd2b529af490e0835d14ef703eba6488720524666b76aedc02c7d17977f6c115474b6639ffcce409ebb205deb182b08a48fe5986109b616d
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.datFilesize
11KB
MD5cd56e155edf53e5728c46b6c9eb9c413
SHA114b1b0f090803c9ee39797aed4af13dc7849566d
SHA25670a6cf268c013fb4d907bedc12af3e5f802f179f0cc8353c7b8227dde840d31a
SHA512a4ada455d44a89fd2baa505aa9266b70913967b839522ef5da8d7afd31af6662c3ad96ac3e3531d82a72be7d019c9d88f1ce391c5b5fa0e4422a634c51491165
-
C:\Users\Admin\AppData\Local\Temp\7zE4CB27F19\AxoPac\ASP.NET Web Pages\v1.0\Microsoft.AspNet.Razor.ru.1.0.20105.408\lib\net40\ru\system.web.razor.xmlFilesize
88KB
MD5398dc059ac7b960a31bba803c6d4b7a3
SHA1dfac62f6e4ac50a0029031244fc5a1469ffe90e8
SHA256943feccacef5fe23b3daf662594e3b45fcb8bc1caf25ea1c474721921caa9488
SHA512f3bb82690b39dad744be9c403f7efcf2c40c903f85be013fff4b1a2ac77e8d59e77bc1eb9989134f800fba3d9bcb987485a92b719386750c70dd7fa1acb533e0
-
C:\Users\Admin\AppData\Local\Temp\7zE4CB27F19\AxoPac\ASP.NET Web Pages\v1.0\Microsoft.AspNet.WebPages.ru.1.0.20105.408\lib\net40\system.web.webpages.razor.xmlFilesize
6KB
MD59c8531c1d5f692cd921c8a56d85bc85d
SHA1801b699bec07e93fdd05469f15cf80be4178e409
SHA25616953fbbff24c3d927e5640060948da47c15a32918ecb2fc4f922a82b3fcfa9c
SHA5123e7fbce84ca7bc96d46ffc3b4fc7acf21d962d379589125a6515178693c379eb6b5833e428ec11f106e9b807147c698e898840a20a8189a01baf76ace9a1f719
-
C:\Users\Admin\AppData\Local\Temp\7zE4CB27F19\AxoPac\ASP.NET Web Pages\v1.0\Microsoft.Web.Infrastructure.1.0.0.0\lib\net40\Microsoft.Web.Infrastructure.dllFilesize
44KB
MD5969d6caf273394f064475292d549516e
SHA191f688c235388c8bcee03ff20d0c8a90dbdd4e3e
SHA256fe18f4259c947c1fd6d74f1827370e72d7ad09aefb4b720af227333583e0169f
SHA512b4f6a614e5fc52850e3d02ebf7e85abf1ebe3fb4ebd6b4f03ec9dc4989cce88e44714ca2198dd7e632f5ed0f15225a68b31052da33e5ac3ce48a1c91c3c04446
-
C:\Users\Admin\AppData\Local\Temp\7zE4CB27F19\AxoPac\ASP.NET Web Pages\v1.0\Visual Studio 2012\thirdpartynotices.rtfFilesize
87KB
MD5b0ac92e72b07a4b37d66f0264e3373c0
SHA1769dec94ed0bfcb47e68026aa01e80a26943ff38
SHA2565a0792c375031840221f1737ba389b0d6dac373b118a107e50fbe78fe5f4ba69
SHA512716c37b16c577de53b7f6e3934e09ae329e138a8a1725d60e9d8907c43c4400918a31b12ae173644efc25ccc9bf7cb332a3042c17386a3724320ab977a7ded52
-
C:\Users\Admin\AppData\Local\Temp\7zE4CB27F19\AxoPac\ASP.NET Web Pages\v1.0\WebConfig\System.Web.WebPages.Deployment.dllFilesize
25KB
MD5f9efab153915541f6cbdd147f85f9842
SHA15d923740f2377298ad917eb9f5bfb45e0b1465fb
SHA256130fe2b8282263c77d9bee89d636166848291432696c449d708c819b17bf053a
SHA51274890a53f2b0b73816e5155fb2b48580fa1dbf3e35077e7915d96ae57516c5da2bbf968978ae134e12754039a5ada6f8dfbcdc121cab9b887a6d4d259b68f3ba
-
C:\Users\Admin\Downloads\AxoPac.rarFilesize
20.7MB
MD514fab6a4955da0f37c5452b2379f90d2
SHA14093aa9c1789b6403b0868eeda43a5b960d7ff24
SHA256f599d1c593ece55af6326a9ed624b8e50f17acf1df1160971300cd41c97f00f9
SHA512c563150d2a496d01488f3851b4f7a53b7aadc658ebad0ef008d3030612d4d7f00a9d355bb395813f357509e1cee294a497c0bcb09f72867d5aaa7ae1212fb295
-
C:\Users\Admin\Downloads\AxoPac.rar:Zone.IdentifierFilesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
C:\Users\Admin\Downloads\Unconfirmed 174129.crdownloadFilesize
1.5MB
MD5c73433dd532d445d099385865f62148b
SHA14723c45f297cc8075eac69d2ef94e7e131d3a734
SHA25612ef1c8127ec3465520e4cfd23605b708d81a5a2cf37ba124f018e5c094de0d9
SHA5121211c8b67652664d6f66e248856b95ca557d4fdb4ea90d30df68208055d4c94fea0d158e7e6a965eae5915312dee33f62db882bb173faec5332a17bd2fb59447
-
\??\pipe\crashpad_1032_LLDCQNTXMWFXSFTEMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1408-1645-0x0000000006BA0000-0x00000000071B8000-memory.dmpFilesize
6.1MB
-
memory/1408-1651-0x00000000072C0000-0x0000000007336000-memory.dmpFilesize
472KB
-
memory/1408-1644-0x0000000005520000-0x000000000552A000-memory.dmpFilesize
40KB
-
memory/1408-1642-0x0000000005AC0000-0x0000000006066000-memory.dmpFilesize
5.6MB
-
memory/1408-1646-0x00000000066D0000-0x00000000067DA000-memory.dmpFilesize
1.0MB
-
memory/1408-1647-0x00000000065E0000-0x00000000065F2000-memory.dmpFilesize
72KB
-
memory/1408-1648-0x0000000006640000-0x000000000667C000-memory.dmpFilesize
240KB
-
memory/1408-1649-0x0000000006680000-0x00000000066CC000-memory.dmpFilesize
304KB
-
memory/1408-1650-0x0000000006930000-0x0000000006996000-memory.dmpFilesize
408KB
-
memory/1408-1643-0x00000000055B0000-0x0000000005642000-memory.dmpFilesize
584KB
-
memory/1408-1652-0x0000000006B10000-0x0000000006B2E000-memory.dmpFilesize
120KB
-
memory/1408-1654-0x00000000084F0000-0x00000000086B2000-memory.dmpFilesize
1.8MB
-
memory/1408-1655-0x0000000008D30000-0x000000000925C000-memory.dmpFilesize
5.2MB
-
memory/1408-1640-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/1868-1641-0x0000000000A80000-0x0000000000A81000-memory.dmpFilesize
4KB
-
memory/1868-1639-0x0000000000A80000-0x0000000000A81000-memory.dmpFilesize
4KB
-
memory/2008-1662-0x0000000001610000-0x0000000001611000-memory.dmpFilesize
4KB