Analysis

  • max time kernel
    1779s
  • max time network
    1795s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    22-03-2022 01:19

General

  • Target

    http://1.1.1.1.53

Malware Config

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • PlugX Rat Payload 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" http://1.1.1.1.53
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ffb495f4f50,0x7ffb495f4f60,0x7ffb495f4f70
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4140
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1592 /prefetch:2
      2⤵
        PID:2220
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2012 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:908
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2356 /prefetch:8
        2⤵
          PID:4116
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2992 /prefetch:1
          2⤵
            PID:1128
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2984 /prefetch:1
            2⤵
              PID:3800
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4332 /prefetch:8
              2⤵
                PID:4576
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:8
                2⤵
                  PID:3576
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3800 /prefetch:2
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2232
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2968 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2828
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4564 /prefetch:8
                  2⤵
                    PID:676
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4588 /prefetch:8
                    2⤵
                      PID:2064
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1484
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3844
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4552 /prefetch:8
                      2⤵
                        PID:3740
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4868 /prefetch:8
                        2⤵
                          PID:4992
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4940 /prefetch:8
                          2⤵
                            PID:5096
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5092 /prefetch:8
                            2⤵
                              PID:776
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5240 /prefetch:8
                              2⤵
                                PID:4896
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5364 /prefetch:8
                                2⤵
                                  PID:3244
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4396 /prefetch:1
                                  2⤵
                                    PID:3852
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:1
                                    2⤵
                                      PID:4724
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 /prefetch:8
                                      2⤵
                                        PID:4596
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=900 /prefetch:8
                                        2⤵
                                          PID:448
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1400 /prefetch:8
                                          2⤵
                                            PID:2072
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4516 /prefetch:8
                                            2⤵
                                              PID:4632
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4560 /prefetch:8
                                              2⤵
                                                PID:1372
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2128 /prefetch:8
                                                2⤵
                                                  PID:4264
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4548 /prefetch:8
                                                  2⤵
                                                    PID:3744
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=904 /prefetch:8
                                                    2⤵
                                                      PID:556
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4448 /prefetch:8
                                                      2⤵
                                                        PID:3676
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4856 /prefetch:8
                                                        2⤵
                                                          PID:2976
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5108 /prefetch:8
                                                          2⤵
                                                            PID:4988
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=904 /prefetch:8
                                                            2⤵
                                                              PID:4128
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4280 /prefetch:8
                                                              2⤵
                                                                PID:2824
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4756 /prefetch:8
                                                                2⤵
                                                                  PID:2292
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4948 /prefetch:8
                                                                  2⤵
                                                                    PID:4048
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5260 /prefetch:8
                                                                    2⤵
                                                                      PID:1848
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4352 /prefetch:8
                                                                      2⤵
                                                                        PID:776
                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe
                                                                        "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=tzsONo+I3XDBwxeyp9gYebPUmY3VmQhor3AuOfWl --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=NewCleanerUIExperiment
                                                                        2⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:5024
                                                                        • \??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe
                                                                          "c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=99.279.200 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff7c49625a0,0x7ff7c49625b0,0x7ff7c49625c0
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1360
                                                                        • \??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe
                                                                          "c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_5024_OANTQWSBSPXTDVAA" --sandboxed-process-id=2 --init-done-notifier=768 --sandbox-mojo-pipe-token=205382994114254741 --mojo-platform-channel-handle=752 --engine=2
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1064
                                                                        • \??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe
                                                                          "c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_5024_OANTQWSBSPXTDVAA" --sandboxed-process-id=3 --init-done-notifier=1000 --sandbox-mojo-pipe-token=4392714220050240077 --mojo-platform-channel-handle=996
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:4164
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 /prefetch:8
                                                                        2⤵
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:3832
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5008 /prefetch:8
                                                                        2⤵
                                                                          PID:2260
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4856 /prefetch:8
                                                                          2⤵
                                                                            PID:3740
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                          1⤵
                                                                          • Modifies data under HKEY_USERS
                                                                          PID:1376
                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                          1⤵
                                                                            PID:944
                                                                          • C:\Windows\System32\svchost.exe
                                                                            C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                            1⤵
                                                                              PID:3624

                                                                            Network

                                                                            MITRE ATT&CK Matrix ATT&CK v6

                                                                            Credential Access

                                                                            Credentials in Files

                                                                            1
                                                                            T1081

                                                                            Discovery

                                                                            Query Registry

                                                                            2
                                                                            T1012

                                                                            System Information Discovery

                                                                            1
                                                                            T1082

                                                                            Collection

                                                                            Data from Local System

                                                                            1
                                                                            T1005

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\ProgramData\Microsoft\Network\Downloader\edb.chk
                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              12e2c40794242f6be8edf3d657b369f4

                                                                              SHA1

                                                                              cff5024b69c0f99610b5ff175880103c4edcba6e

                                                                              SHA256

                                                                              11526e419f69b59919799cb04ac5fb71c7bf6f231ccb417729911d3e7d7f9f6a

                                                                              SHA512

                                                                              aa3362127079db5b4befacba0bc91241f426ee173183772b7b9320b76035aaec0db0833b07fb394be872ce7fc1168e0a891dfc65d5966dd6d74cf57f34a406e5

                                                                            • C:\ProgramData\Microsoft\Network\Downloader\edb.log
                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              d84999e95a3b01ea71e09942eea95bc8

                                                                              SHA1

                                                                              dbf5344115e89570abc7af3c2ef080b61f815f19

                                                                              SHA256

                                                                              4c0c09abb7be2ac488b5a9e1471fffdad65855d350459712abffab4e62f757bd

                                                                              SHA512

                                                                              bc549d4b207ffd632fb935c58b4d4e57de2eec2c32f77c353cda4945edf5547f6f2696bfddd658333279bf01e7b28ec51bb9fb1aa58848eaa6dd2143923603a7

                                                                            • C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
                                                                              Filesize

                                                                              768KB

                                                                              MD5

                                                                              9f3ba7dc36a88ded6c8885dd4886a3c0

                                                                              SHA1

                                                                              decccd7addd0020263cdd747b9a686528952b232

                                                                              SHA256

                                                                              4decdb8365a615dcd71bad5a8a357ca25d74446c07bccd584e37ba47f3a4ee11

                                                                              SHA512

                                                                              6d6cfe5a161fbc77adecb955ee2fd27a697df65ea7dca33630b616271863995838cfe60b17231c42699931362cee70c68c9c58c1f657fc9c47712643f778f5f3

                                                                            • C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
                                                                              Filesize

                                                                              16KB

                                                                              MD5

                                                                              fe4ed56fd303c5a1c053eaccc7430f83

                                                                              SHA1

                                                                              952aee1f32060ea2859bda3e221f7987d13930df

                                                                              SHA256

                                                                              f875966e111f865ffacecb4b2312a01a1b2d9f1baaae717bf032155860dbfccf

                                                                              SHA512

                                                                              b562bb023e3b6463cc236f54994e13c38a80be20a664382dcdff62cec50b197257ad0cc348e6b316260e8a3799f4c92f40d0605c0f4aab2fc7895c69908b1627

                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
                                                                              Filesize

                                                                              40B

                                                                              MD5

                                                                              821c1122f0d1d5d9da13bb3a9b2bbe19

                                                                              SHA1

                                                                              f571758a82487d499a3a594073d5d03860002a97

                                                                              SHA256

                                                                              496c5a4bf9c2b9f82d5eed099129e60fd705da43a30511b7f7ac1c02513013d0

                                                                              SHA512

                                                                              06b00209546e4f13b569191dfc36334c114e0a4b6bc4375e18b4927360e47582900694a10f8de7914ca20090ddc5a688d0907a054579ae961d572c3b5c2b2a38

                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe
                                                                              Filesize

                                                                              13.9MB

                                                                              MD5

                                                                              3dcd45838971b3e51d01e62c09d36e08

                                                                              SHA1

                                                                              9884fc2f1ed03043d5a6aa5f59625b7a0cad4c2a

                                                                              SHA256

                                                                              d7081c02c19718ed94ef3154ede0d045c50ba7d9e7653b7b5c589ac1a0b36f81

                                                                              SHA512

                                                                              6e2b5e3b75bd872bd01c6b8feaea76aea733f75320e4b88877ef1aae061d37ac0de82943502c2c575f67dcd77961bba506d5f16489bd33b8aa621e472fe648fa

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches
                                                                              MD5

                                                                              d41d8cd98f00b204e9800998ecf8427e

                                                                              SHA1

                                                                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                              SHA256

                                                                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                              SHA512

                                                                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1092136905\0.57.44.2492_hnimpnehoodheedghdeeijklkeaacbdc.crx
                                                                              Filesize

                                                                              6.4MB

                                                                              MD5

                                                                              b92bbcfd3c31f799c5863d78154db555

                                                                              SHA1

                                                                              86b1b058e1e7d2f1f35e830db446b59e15670e5e

                                                                              SHA256

                                                                              6f6bc93dcd62dc251850d2ff458fda96083ceb7fbe8eeb11248b8485ef2aea23

                                                                              SHA512

                                                                              38be0c179619c045a321d1fa2c67dda8419a33075a87f548feed9a858f5ba19b5b980c53d4a3bb5b745c7ce566b53773785aa1f7677e37dd5793ccae76e83787

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1159071961\lmelglejhemejginpboagddgdfbepgmp_323_all_ZZ_adqdw77yqkpha32r7zhdr2jdg3rq.crx3
                                                                              Filesize

                                                                              45KB

                                                                              MD5

                                                                              f20ad841bad411b41af1cb4d608922ab

                                                                              SHA1

                                                                              47753d002863313567fb67a42c6442399dfd6c02

                                                                              SHA256

                                                                              ca33735f84fd65b502ca0f70fc5e2184151a6dbbdbeb28043e6716f0985f5291

                                                                              SHA512

                                                                              a9c8e82483b72e217055b1c14c415a27ec7a828ce7daaad12fec0e79c698606b776b861b5fdb5cef247b4651107fb3bb35696f7832d5f11b5665c0611ef4c6d2

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1163850008\1.0.6.0_aemomkdncapdnfajjbbcbdebjljbpmpj.crx
                                                                              Filesize

                                                                              9KB

                                                                              MD5

                                                                              538846624012e70d0f232abfc055f089

                                                                              SHA1

                                                                              4f51ed1a04440132b603ba782794fc656d877e9f

                                                                              SHA256

                                                                              c25787c5c76ff9c4c50a87d32802301c9ed80d934830d677bbc6629e290cb5aa

                                                                              SHA512

                                                                              bde91c6599cbdc2b690c7a24693e5631155d744751620d9bc775771f10d397a699edd4d807b377afc2c2750328ef8b9e3b6182a3282520bc3d737c9f9bfe3226

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1171314175\gkmgaooipdjhmangpemjhigmamcehddo_99.279.200_win64_bfvhlc4qxechbboqg5aqlmsmxe.crx3
                                                                              Filesize

                                                                              6.5MB

                                                                              MD5

                                                                              fc7e8f8dc9ca62a7bc79d2c5c2833aa8

                                                                              SHA1

                                                                              42c19d481d6b407005d5696db46802f96b180a78

                                                                              SHA256

                                                                              f34e17cc90ce3e33fece88503070bc71be525c6a75d5a516addf758ae811eb5f

                                                                              SHA512

                                                                              a4b81dad5dbdcc7442a99e35caeda2585277b9992ffd41bc24e992f89ab34391f82960cd778cb38a787fca80e6ea28e28e560ebd2f960c293aabd30630fcdec4

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1250380792\khaoiebndkojlmppeemjhbpbandiljpe_48_win_ccfl2wvh5b5bfuztfguafrvlpm.crx3
                                                                              Filesize

                                                                              5KB

                                                                              MD5

                                                                              e8fae5f775b15f88fd410e6c9b23c0c4

                                                                              SHA1

                                                                              149151e2ad212b1a529ca40c5e5510adbd8bba84

                                                                              SHA256

                                                                              5f1c8af8a15da419e629cc50d85e7326cda080bd1f7df8ac38a16b98e0a2739b

                                                                              SHA512

                                                                              6d9999f4a2fe6101cb08c1be0299e73c5de7cba756caa4e628d18f80fd8e3243442af6bebdc96bd4c8ce32e24c54f81bc573a12368d8c6b8d826467f58b9baa0

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1256648830\aapLKTSZ439A-0g3nqJr3Q
                                                                              Filesize

                                                                              3KB

                                                                              MD5

                                                                              5e2ec48715685943e1d278ead69f5ec9

                                                                              SHA1

                                                                              a96964084338ebcd2a0375f81777dea88ed2d8d0

                                                                              SHA256

                                                                              70497f45af368f6d591eb9b93a097b7b56821b0770ee00f04b2f5901487a0421

                                                                              SHA512

                                                                              6deaf5fd5456d0493cf8731a97e664bad1e7b00ffc73c099fc0df346e9468d450453d3baf10b18e4061a81b7d1f87cac12425ba7b18160a61c8d0318dc1d0122

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1467138808\ALzUVHP-vRgKCzqwbtGugSE
                                                                              Filesize

                                                                              5KB

                                                                              MD5

                                                                              0bf5369cda2102f7a1f1fec9ae6f69ff

                                                                              SHA1

                                                                              1a6b9c07dd6cf2aa5d969499ddff8a0dfc15e86c

                                                                              SHA256

                                                                              fd515ec0dc30d25a09641b8b83729234bc50f4511e35ce17d24fd996252eaace

                                                                              SHA512

                                                                              39c131142cecb88eedf7f74bac4dfbc50c1de88f3ffd10d1cca79b154a95c59d6f09c78580367e39dbc648fa0a87a74a4e9a336d691f68388e43b7e2efd40f71

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1697565310\ggkkehgbnfjpeggfpleeakpidbkibbmn_2022.3.14.1147_all_adu2ewrzm5fugsecmuxlx655fijq.crx3
                                                                              Filesize

                                                                              9KB

                                                                              MD5

                                                                              c7709a43f101c22828967a56a0d3a1de

                                                                              SHA1

                                                                              9165a4b834d3cf833187850684f3959bc1fec871

                                                                              SHA256

                                                                              bfa1a6198e6ca1d70da66818e4de60ea78606520ef33ece1433eb5a3402560e9

                                                                              SHA512

                                                                              34d4b303f27e7e80e21e9bc361fa682b25e3fcfe0145aba3cef1b1a2df3c7c0d36fa301d17cf73a1bb51cf734d7ee2e88a1b1643f6de83997916d20b159d9312

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1884698644\EWvH2e-LS80S29cxzuTfRA
                                                                              Filesize

                                                                              111KB

                                                                              MD5

                                                                              d7d63288830d5930f435d6841de6de5a

                                                                              SHA1

                                                                              a2afc39ac8fd17fa88030ba8b48d9d8ee93c24d5

                                                                              SHA256

                                                                              c64c9c1008f3ba5f6e18b3ca524bc98dcd8acfae0a2720a8f1f3ef0f8d643d05

                                                                              SHA512

                                                                              d4d85fd16a291474f99a6fa9cc76d5432f5865fa0d76e4185ff5ab775045122cdab771e88da8fc317a059ab901373644b2e7251d31c4fa2c389d9b7584351e20

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_2000947545\2018.8.8.0_win64_win_third_party_module_list.crx3
                                                                              Filesize

                                                                              5KB

                                                                              MD5

                                                                              a27fd6952edc92d0ce6241a3926cd5e2

                                                                              SHA1

                                                                              c7b44abb244be659e5afdd22827100a6a94a1f2b

                                                                              SHA256

                                                                              a8a79d350c2a5e3bc36226633a8e0bed0dfab184e77f38fc8f0820ebacf8eafc

                                                                              SHA512

                                                                              4a69f9726dda9f2819b87200397f8141cb49abcf08add5d390f84eec9c4da42f7a8c8ddac7840b137f85f9e2a9c13bc369225636fefec57022d63abe505f21cc

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_2108208562\hfnkpimlhhgieaddgfemjhofmfblmnib_7229_all_h72pv2oencmwofj3ce37gzp2oe.crx3
                                                                              Filesize

                                                                              24KB

                                                                              MD5

                                                                              bff93165c495ea91ae95071fc3be0842

                                                                              SHA1

                                                                              62ea7fd4ec2a68f2b0b306c7e8a18238ed63256a

                                                                              SHA256

                                                                              34918dfad8c9af3cdf18ed5782c6670973a08e683d33186d1c761512d590809b

                                                                              SHA512

                                                                              30951d1802e1840ba1945b8803749a61a991c94a8b01b1704daf19adbe00f7474ce6d27978ca86bc16cd687e0e4241322a5dbb0e668877844ce792e1310ec366

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_415496597\gcmjkmgdlgnkkcocmoeiminaijmmjnii_9.34.0_all_acb7qksdc2wjznjioir7p6lt3dwq.crx3
                                                                              Filesize

                                                                              37KB

                                                                              MD5

                                                                              c919be360bcc277412b08aaf36831db4

                                                                              SHA1

                                                                              7c33e8f1f9b245aec0e0e4168a54350615f52d9d

                                                                              SHA256

                                                                              93823a4e71e764b932ee22dfcf84c24429867a440c5e480e55be527ac30de1ae

                                                                              SHA512

                                                                              aa82748a902db51d80c6b4c0395d108e1067693d3ef031f599be6f7567bb80d2e76d66932c2e85a6708533e6d1fbbe45c514275be98069fbe887039037038a2c

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_669947555\jamhcnnkihinmdlkakkaopbjbbcngflc_102.0.4956.0_all_ogugyyqsn2cm2tfmo76eyfmhce.crx3
                                                                              Filesize

                                                                              799KB

                                                                              MD5

                                                                              4c39f2934560747e10a2f3446bf02a08

                                                                              SHA1

                                                                              753feb3cb47585d584685effb350d811addce0d5

                                                                              SHA256

                                                                              14d7184db45a9fa27e4aeeba9ec6cf3cef8956f2b75b4546dff1ad545728359a

                                                                              SHA512

                                                                              9a659dd0a775a8bba807d34e2bc1c9dcc2810c82e5d828eef5a68fe022bb9be3eeaecd6874edf2d5efc8fec1e5c04fc9b841d0f2107d5cdafb3ddc0f9cff65d2

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_690506867\obedbbhbpmojnkanicioggnmelmoomoc_20220222.432047118_all_ENUS500000_hbwjwk7bommr565nn72etjdnwe.crx3
                                                                              Filesize

                                                                              5.1MB

                                                                              MD5

                                                                              a75cd4f42d1c9dbdaf22b31e06c0fe44

                                                                              SHA1

                                                                              dfea9712224315d809cf432b1d84128dfa11ada5

                                                                              SHA256

                                                                              191e8d0245ef4a9e9fac8966c175ae9b3943d70cfe949de9e33d3c6a19b7c840

                                                                              SHA512

                                                                              d7b54e94a2a42697a7b25fb287fae12d7342acde89a482dd00c37edbe5234f2c8f899732dd519a0fdff15c1f04cb21bbd618e78df4102e61878aad22a8826449

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_762354855\jflookgnkcckhobaglndicnbbgbonegd_2787_all_acgnvv6n3hacb3n4e4czianutfka.crx3
                                                                              Filesize

                                                                              26KB

                                                                              MD5

                                                                              fe78c6753cc2bdb3613881d5f32e2b62

                                                                              SHA1

                                                                              aad2684de63a8a923163082ddfe8d5dd02e94ed2

                                                                              SHA256

                                                                              a9316b83adecfbb08b86a942afa6a9dd27ac46decf77d0301482e99166d139c0

                                                                              SHA512

                                                                              613dae6d1a5ce2e77d342f5c450ddffa74e60bd57feac5c49c1fddd622dea351771f64c152030916a5ff1f0125bfd3a49e3a04f998af6330cd283099a6060da5

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_782544570\kiabhabjdbkjdpjbpigfodbdjmbglcoo_2022.03.21.04_all_kysknvibv7hrxnl2wz3m5e3yny.crx3
                                                                              Filesize

                                                                              10KB

                                                                              MD5

                                                                              f379c6dd2e8ff62b87dfcf7ee182127a

                                                                              SHA1

                                                                              5ee94653ae72c643198834a1b3e29a241fc07911

                                                                              SHA256

                                                                              2813194f400ac3d34ed4de57259243e9e8cc38c14f974da6916820ac01bc0342

                                                                              SHA512

                                                                              eb209e92f3ba5fbef45155488f24a00bcd5b1bf1badc4673cb5dce686b5c7efc9d5169351e6946aa8ea5fddd6ce5efade9777bcd4f10a0156ce9f8552851f105

                                                                            • C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_807135886\S3ybLvFx94Hgn9pWLt24ug
                                                                              Filesize

                                                                              9KB

                                                                              MD5

                                                                              867bf8c831d8385cc3ffa006bc864a22

                                                                              SHA1

                                                                              c0eaed582e36c741c9d904b89ef29954d2852042

                                                                              SHA256

                                                                              b4ddbdce4f8d5c080328aa34c19cb533f2eedec580b5d97dc14f74935e4756b7

                                                                              SHA512

                                                                              359a39916d9cfa6c24ac0c5b152945297a84106bf03aacf69e0439ddc70118adc5ae4a5e26efe9e111c3f26381a7418d9e49a117cd6fd00aedf0a410b9dd8218

                                                                            • \??\pipe\crashpad_4300_FGTAOMLJTDKLHJWJ
                                                                              MD5

                                                                              d41d8cd98f00b204e9800998ecf8427e

                                                                              SHA1

                                                                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                              SHA256

                                                                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                              SHA512

                                                                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                            • memory/1064-176-0x00007FFB678E0000-0x00007FFB678E1000-memory.dmp
                                                                              Filesize

                                                                              4KB

                                                                            • memory/1064-184-0x0000024695180000-0x00000246951C0000-memory.dmp
                                                                              Filesize

                                                                              256KB

                                                                            • memory/1064-183-0x0000024695180000-0x00000246951C0000-memory.dmp
                                                                              Filesize

                                                                              256KB

                                                                            • memory/1064-182-0x0000024695140000-0x0000024695180000-memory.dmp
                                                                              Filesize

                                                                              256KB

                                                                            • memory/1064-181-0x00000246953B0000-0x00000246953F0000-memory.dmp
                                                                              Filesize

                                                                              256KB

                                                                            • memory/1064-177-0x00007FFB67DD0000-0x00007FFB67DD1000-memory.dmp
                                                                              Filesize

                                                                              4KB

                                                                            • memory/1376-144-0x000001CC632B0000-0x000001CC632B1000-memory.dmp
                                                                              Filesize

                                                                              4KB

                                                                            • memory/1376-143-0x000001CC633B0000-0x000001CC633B4000-memory.dmp
                                                                              Filesize

                                                                              16KB

                                                                            • memory/1376-141-0x000001CC633C0000-0x000001CC633C4000-memory.dmp
                                                                              Filesize

                                                                              16KB

                                                                            • memory/1376-140-0x000001CC65840000-0x000001CC65841000-memory.dmp
                                                                              Filesize

                                                                              4KB

                                                                            • memory/1376-139-0x000001CC65860000-0x000001CC65864000-memory.dmp
                                                                              Filesize

                                                                              16KB

                                                                            • memory/1376-134-0x000001CC62F70000-0x000001CC62F80000-memory.dmp
                                                                              Filesize

                                                                              64KB

                                                                            • memory/1376-136-0x000001CC63390000-0x000001CC63394000-memory.dmp
                                                                              Filesize

                                                                              16KB

                                                                            • memory/1376-135-0x000001CC62FD0000-0x000001CC62FE0000-memory.dmp
                                                                              Filesize

                                                                              64KB

                                                                            • memory/1376-142-0x000001CC633B0000-0x000001CC633B1000-memory.dmp
                                                                              Filesize

                                                                              4KB

                                                                            • memory/3624-153-0x0000022979F30000-0x0000022979F34000-memory.dmp
                                                                              Filesize

                                                                              16KB

                                                                            • memory/3624-154-0x0000022979CC0000-0x0000022979CC1000-memory.dmp
                                                                              Filesize

                                                                              4KB

                                                                            • memory/3624-152-0x0000022979C90000-0x0000022979C94000-memory.dmp
                                                                              Filesize

                                                                              16KB

                                                                            • memory/3624-159-0x000002297A040000-0x000002297A044000-memory.dmp
                                                                              Filesize

                                                                              16KB

                                                                            • memory/3624-160-0x000002297A040000-0x000002297A044000-memory.dmp
                                                                              Filesize

                                                                              16KB

                                                                            • memory/3624-185-0x0000022979FF0000-0x0000022979FF4000-memory.dmp
                                                                              Filesize

                                                                              16KB

                                                                            • memory/3624-186-0x000002297A040000-0x000002297A044000-memory.dmp
                                                                              Filesize

                                                                              16KB

                                                                            • memory/3624-188-0x0000022979CC0000-0x0000022979CC4000-memory.dmp
                                                                              Filesize

                                                                              16KB

                                                                            • memory/3624-189-0x0000022979CB0000-0x0000022979CB1000-memory.dmp
                                                                              Filesize

                                                                              4KB

                                                                            • memory/3624-190-0x0000022979CB0000-0x0000022979CB4000-memory.dmp
                                                                              Filesize

                                                                              16KB

                                                                            • memory/3624-191-0x00000229779B0000-0x00000229779B1000-memory.dmp
                                                                              Filesize

                                                                              4KB