Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01-04-2024 06:43

General

  • Target

    .html

  • Size

    146KB

  • MD5

    9602cce3290d442ff57b8defb95bb82c

  • SHA1

    46b40c8ad2b8d5a36719805f12b40389120ed425

  • SHA256

    f57b75f9a8011bc2f574388d79cbbb75a09cb56b3598bf1d2cc11f26b01f76f6

  • SHA512

    b6c765abf9a3f9abe61da82a87012a6f67999e4f96063b2781de67f95ca638633eedd545ddbea7b6f245188128825a685852c683987e995fd277607037fe9407

  • SSDEEP

    1536:omkyd8LFVMUK4DgnVR4DBllKoVkL30vD9329s4D+HhqiE:1kzLFoVsllXmxYHhqiE

Score
10/10

Malware Config

Extracted

Family

crimsonrat

C2

185.136.161.124

Signatures

  • CrimsonRAT main payload 1 IoCs
  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Downloads MZ/PE file
  • Executes dropped EXE 30 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious use of FindShellTrayWindow 48 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\.html
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb39ec3cb8,0x7ffb39ec3cc8,0x7ffb39ec3cd8
      2⤵
        PID:2352
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:2
        2⤵
          PID:2900
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:228
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:8
          2⤵
            PID:4944
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
            2⤵
              PID:4736
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
              2⤵
                PID:3448
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:1
                2⤵
                  PID:1992
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:1
                  2⤵
                    PID:5012
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:1
                    2⤵
                      PID:3276
                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3244
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3908
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:1
                      2⤵
                        PID:4636
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:1
                        2⤵
                          PID:1576
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:1
                          2⤵
                            PID:2096
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1
                            2⤵
                              PID:1860
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5824 /prefetch:8
                              2⤵
                                PID:1808
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5836 /prefetch:8
                                2⤵
                                • Modifies registry class
                                • Suspicious behavior: EnumeratesProcesses
                                PID:700
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:1
                                2⤵
                                  PID:3132
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:1
                                  2⤵
                                    PID:2836
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6160 /prefetch:8
                                    2⤵
                                      PID:1724
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:8
                                      2⤵
                                      • NTFS ADS
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3712
                                    • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                      "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      PID:4984
                                      • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                        "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        PID:1900
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:1
                                      2⤵
                                        PID:4848
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:1
                                        2⤵
                                          PID:4444
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:1
                                          2⤵
                                            PID:4628
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1880 /prefetch:1
                                            2⤵
                                              PID:1300
                                            • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                              "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              PID:1596
                                              • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                PID:2136
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,2538487743444775078,10221291679022331055,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4864 /prefetch:2
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5872
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:2004
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:1588
                                              • C:\Windows\System32\rundll32.exe
                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                1⤵
                                                  PID:2524
                                                • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                  "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:4724
                                                  • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                    "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:1276
                                                • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                  "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:4232
                                                  • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                    "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:5024
                                                • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                  "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:2404
                                                  • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                    "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:1468
                                                • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                  "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:1536
                                                  • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                    "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:4816
                                                • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                  "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:8
                                                  • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                    "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:2264
                                                • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                  "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:3712
                                                  • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                    "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:4556
                                                • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                  "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:4164
                                                  • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                    "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:2152
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                                  1⤵
                                                    PID:772
                                                  • C:\Windows\System32\oobe\UserOOBEBroker.exe
                                                    C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
                                                    1⤵
                                                    • Drops file in Windows directory
                                                    PID:5176
                                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                                                    C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                                                    1⤵
                                                      PID:5212
                                                    • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                      "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:5728
                                                      • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                        "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        PID:5796
                                                    • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                      "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:5936
                                                      • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                        "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        PID:6008
                                                    • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                      "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:6100
                                                      • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                        "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        PID:5144
                                                    • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                      "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:3240
                                                      • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                        "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        PID:3852
                                                    • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                      "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:2016
                                                      • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                        "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        PID:1556
                                                    • C:\Users\Admin\Downloads\CrimsonRAT.exe
                                                      "C:\Users\Admin\Downloads\CrimsonRAT.exe"
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:4696
                                                      • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                                        "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        PID:2004

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\ProgramData\Hdlharas\dlrarhsiva.exe

                                                      Filesize

                                                      9.1MB

                                                      MD5

                                                      64261d5f3b07671f15b7f10f2f78da3f

                                                      SHA1

                                                      d4f978177394024bb4d0e5b6b972a5f72f830181

                                                      SHA256

                                                      87f51b4632c5fbc351a59a234dfefef506d807f2c173aac23162b85d0d73c2ad

                                                      SHA512

                                                      3a9ff39e6bc7585b0b03f7327652e4c3b766563e8b183c25b6497e30956945add5684f1579862117e44c6bac2802601fc7c4d2a0daa1824f16c4da1fd6c9c91a

                                                    • C:\ProgramData\Hdlharas\mdkhm.zip

                                                      Filesize

                                                      56KB

                                                      MD5

                                                      b635f6f767e485c7e17833411d567712

                                                      SHA1

                                                      5a9cbdca7794aae308c44edfa7a1ff5b155e4aa8

                                                      SHA256

                                                      6838286fb88e9e4e68882601a13fa770f1b510a0a86389b6a29070a129bf2e5e

                                                      SHA512

                                                      551ba05bd44e66685f359802b35a8c9775792a12844906b4b53e1a000d56624c6db323754331c9f399072790991c1b256d9114a50fb78111652a1c973d2880af

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\CrimsonRAT.exe.log

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      8e0f23092b7a620dc2f45b4a9a596029

                                                      SHA1

                                                      58cc7c47602c73529e91ff9db3c74ff05459e4ea

                                                      SHA256

                                                      58b9918225aee046894cb3c6263687bfe4b5a5b8dff7196d72687d0f3f735034

                                                      SHA512

                                                      be458f811ad6a1f6b320e8d3e68e71062a8de686bae77c400d65091947b805c95024f3f1837e088cf5ecac5388d36f354285a6b57f91ea55567f19706128a043

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      3b1e59e67b947d63336fe9c8a1a5cebc

                                                      SHA1

                                                      5dc7146555c05d8eb1c9680b1b5c98537dd19b91

                                                      SHA256

                                                      7fccd8c81f41a2684315ad9c86ef0861ecf1f2bf5d13050f760f52aef9b4a263

                                                      SHA512

                                                      2d9b8f574f7f669c109f7e0d9714b84798e07966341a0200baac01ed5939b611c7ff75bf1978fe06e37e813df277b092ba68051fae9ba997fd529962e2e5d7b0

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      0e10a8550dceecf34b33a98b85d5fa0b

                                                      SHA1

                                                      357ed761cbff74e7f3f75cd15074b4f7f3bcdce0

                                                      SHA256

                                                      5694744f7e6c49068383af6569df880eed386f56062933708c8716f4221cac61

                                                      SHA512

                                                      fe6815e41c7643ddb7755cc542d478814f47acea5339df0b5265d9969d02c59ece6fc61150c6c75de3f4f59b052bc2a4f58a14caa3675daeb67955b4dc416d3a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      df1cbfb57b0c4d9f021cae10716ffce5

                                                      SHA1

                                                      ff569df5910aa77cb66958cedd52469d17f23132

                                                      SHA256

                                                      8fd56a5fb5e3f543783caccd4a300f67209164751a2eb7047d8e07b8e7842e9e

                                                      SHA512

                                                      bb1bb84e299413c7f7b7abaa529e0d89f222f274a21b30c048cc12bda9e40689f724971d9b4fe9450ff98154746ab4bc97a16d0ae7a87a55c89f671507396159

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      111B

                                                      MD5

                                                      285252a2f6327d41eab203dc2f402c67

                                                      SHA1

                                                      acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                      SHA256

                                                      5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                      SHA512

                                                      11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      6c52869b4a2c5737cbb1c4cd7715629b

                                                      SHA1

                                                      0107c183561de29d3a102b89c037c3cd403f26f8

                                                      SHA256

                                                      aa8e449864ce04e610438b50ed6c278eed16dabf9cbb734741cffaaa3a241ec0

                                                      SHA512

                                                      d080bb3c74d12fe56fdeac7c13cf8dbf9bee0b7ac34306a44a2c4c49dab50c2c5c60ee16d0718c5c0228131783f451b6ba79f76bc3991c9d3503343a50fbf5ac

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      3d7c725f0d6727b659d660e850333c11

                                                      SHA1

                                                      8bfbc45df167b788c54854d5edcf999d3ad9c7f0

                                                      SHA256

                                                      88ee118da8ed9a63ceb5148def7130474a415ce74e16137b0b32e21e873d9c4b

                                                      SHA512

                                                      b25fc905b1038d750cabc1468fe752e9cd61fe3079f8e86fcea0c14ea8c47294e86356315ca519e55ec3474085f19577133228046d7ad0ac20093b114952c9ef

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      d575e2e76aa0b711d2e9cbadff22b615

                                                      SHA1

                                                      50bdcf815ce38582dc0c22b552f67c1930f062f6

                                                      SHA256

                                                      9f5281cf1c048f01777c9c7e71c48a3b9937b836c1558edfcb108497d6e29037

                                                      SHA512

                                                      81915e87e86bd50be7349adb3672c2ed765fc0198bb0d98cf934839b348594370377a75f061ffd2bfd845c35e89aa6e5a6b783ad9041918a35d9ec51362bebab

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      0adeacc891e59ebd865f7481f039aa5e

                                                      SHA1

                                                      67fa199d31bc4f2acd106849e65c593b83662e67

                                                      SHA256

                                                      e13910f10b0bfb1f4b5df2ceb158bfa66c9e423ebdd5beea06c1a9f62923c1c1

                                                      SHA512

                                                      b87abd2028060fa166a80558efbe118c7a30c6b4787380f02464cd8ca88f4588d9d73a287de9f364bf70ce14d2c92f25f592a6763295829b4c2f926f1d6a3f5f

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      8109da5c2d66e2177069f383684bfe26

                                                      SHA1

                                                      b03b047492254152b1f6c6a7b402a0e499ff8d08

                                                      SHA256

                                                      53c1ad19f39cc58857e1859bc8af6c93201b0f886c29609645c6c2483f2cb17e

                                                      SHA512

                                                      1868b668b168a6e8928f66661f4c01aec40264326abbb02fe0d50e17c470bcf72d7b30fe0fd04e70cbdfaf69ff075c4435f59d33a280f169e5a08fe7fa427977

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      05ecdf35eb02a4286344ba856806b2d7

                                                      SHA1

                                                      a9cc56f929ee623a7c90d3fd929d1969b3b58e39

                                                      SHA256

                                                      53320e88157ed07094ef06633feb63546e8d8fc61951bb89f03437bb7f5ded0e

                                                      SHA512

                                                      6c03b4876b9fb14dfbe558a9597f9284cc9680223a5fd8959f9082bc329dd75ef0020a5188c1efa5d34a1b46e32e6e9a0627b1773039566fce7881ac61492579

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      c14241428f85f7a99194efcfea5e0510

                                                      SHA1

                                                      346cace69d1f7fafe01778d7c0ec09bd734cc5d5

                                                      SHA256

                                                      ff61f1b7ead4bbb4ec67731a55ad4978868805b88ccdeaba4d2d0391fb30526c

                                                      SHA512

                                                      a073c382930636fa128608a1e7fbff628eaf244fe2223f69b8f3625f657db3bdca0e63817fda89de7d36c0ded548cd8324cb38a6231123da6cf249baba915aaa

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      59872c355d77525141ebc28c0fd422d3

                                                      SHA1

                                                      bb16e62f24ae4d49b26e95928830546d6691345f

                                                      SHA256

                                                      ed7c77580569be8dab4b49840b2cf67f2895733e3dcb4410485bc43cf0d4c374

                                                      SHA512

                                                      49236b00425b203919782f92986a5925ac13edbd885b8ed4c21acda21cb3400579fae8d9efc82e5908335a3419fe2dcc880f3868cdb4ff1ebf45c0b7340d71c2

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57ca93.TMP

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      ff704cdb82e0caa20585a407af61e292

                                                      SHA1

                                                      dfa41f00fc755e00b29bbe95595f6f069e8ac700

                                                      SHA256

                                                      43550d49ab5a5c5447fcf7ea053b13a2846745f346b372ff75956443864075bb

                                                      SHA512

                                                      7ea4b2c2d48c0f2435055fdf724f692f669a1df707d1a7c50dca4fb3ab8bf71282119cc450772121264184d424d2fead64a22b51cca2e8a2935ccd6851c88564

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      6752a1d65b201c13b62ea44016eb221f

                                                      SHA1

                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                      SHA256

                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                      SHA512

                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      646dc98d39525e43d108f49600471741

                                                      SHA1

                                                      dfb17e05f17603428f305ac167ee02909d790bde

                                                      SHA256

                                                      a1abc93e98b3006c1f8ad20faae6b08a5f5c3ed0f006c53aefef2257707e669a

                                                      SHA512

                                                      e0a6f2059b1a0d1cf9257e2cc1b0967bbce50656964a9ee3de960cbdf667a7007c083e55c3cf73e2724f99243d9260bb885d38bcc95285c4c8c2c2b45b8645d0

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      a4fa0b4a922e7c271b1651f7ec66c405

                                                      SHA1

                                                      e3a1d0d9182b2143750361192bc1729107eb6673

                                                      SHA256

                                                      bfbf4e3e7f957a4c9cee1c723d8312717ff5a30eb063b06ac94a754bc27f1bb5

                                                      SHA512

                                                      48979ebe16653aeb76d6fa222f91fd9b2a87105bbb38850e9a5f9d95264cdb5eccc7ae5bb9e0a2094b885271f6f926a01803be9c83186e5957ac90bd5028ffde

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      6b3d22659d3aa7f025f8a8c9d9ce4ab0

                                                      SHA1

                                                      8148c23528f1e84b43379af9b64f3bd736e6f417

                                                      SHA256

                                                      a4f1fe11ae971289a08ea14b92793e26a170eada5570fdfa9f657b5121a4cf79

                                                      SHA512

                                                      626af154834cd7ed99b2e84f0b0023ebefec156be34fb37dbbe73429a14aedb7917372d8419ac88b44d9d10c7d9d65a73d984e6cdd1253e840b8a9634f686c6f

                                                    • C:\Users\Admin\Downloads\CrimsonRAT.exe:Zone.Identifier

                                                      Filesize

                                                      55B

                                                      MD5

                                                      0f98a5550abe0fb880568b1480c96a1c

                                                      SHA1

                                                      d2ce9f7057b201d31f79f3aee2225d89f36be07d

                                                      SHA256

                                                      2dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1

                                                      SHA512

                                                      dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6

                                                    • C:\Users\Admin\Downloads\Unconfirmed 101037.crdownload

                                                      Filesize

                                                      84KB

                                                      MD5

                                                      b6e148ee1a2a3b460dd2a0adbf1dd39c

                                                      SHA1

                                                      ec0efbe8fd2fa5300164e9e4eded0d40da549c60

                                                      SHA256

                                                      dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba

                                                      SHA512

                                                      4b8c62ddfc7cd3e5ce1f8b5a1ba4a611ab1bfccf81d80cf2cfc831cffa1d7a4b6da0494616a53b419168bc3a324b57382d4a6186af083de6fc93d144c4503741

                                                    • \??\pipe\LOCAL\crashpad_568_HCGEMDMGDBFWQOCJ

                                                      MD5

                                                      d41d8cd98f00b204e9800998ecf8427e

                                                      SHA1

                                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                      SHA256

                                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                      SHA512

                                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                    • memory/8-589-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/8-582-0x000001D1D3490000-0x000001D1D34A0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/8-581-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1276-532-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1276-567-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1468-569-0x0000021EAA850000-0x0000021EAA860000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1468-588-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1468-593-0x0000021EAA850000-0x0000021EAA860000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1468-568-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1536-572-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1536-573-0x000002149B1E0000-0x000002149B1F0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1536-578-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1596-489-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1596-481-0x00000184F8CF0000-0x00000184F8D00000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1596-480-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1900-448-0x0000022053B40000-0x0000022053B50000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1900-524-0x0000022053B40000-0x0000022053B50000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1900-446-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1900-447-0x0000022052E00000-0x0000022053714000-memory.dmp

                                                      Filesize

                                                      9.1MB

                                                    • memory/1900-505-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2136-531-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2136-487-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2136-488-0x000002EBC6C50000-0x000002EBC6C60000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2152-617-0x000002433FFF0000-0x0000024340000000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2152-616-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2152-608-0x000002433FFF0000-0x0000024340000000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2152-607-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2264-590-0x000001797AEA0000-0x000001797AEB0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2264-587-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2264-611-0x000001797AEA0000-0x000001797AEB0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2264-610-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2404-570-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2404-563-0x000001D1AA0E0000-0x000001D1AA0F0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2404-562-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/3712-592-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/3712-599-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4164-609-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4164-602-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4232-554-0x000001B57FF60000-0x000001B57FF70000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/4232-560-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4232-553-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4556-613-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4556-600-0x000002B69D120000-0x000002B69D130000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/4556-598-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4724-533-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4724-527-0x0000022D76CF0000-0x0000022D76D00000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/4724-526-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4816-597-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4816-577-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4816-603-0x000001FA45360000-0x000001FA45370000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/4984-450-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4984-411-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4984-410-0x0000023ED1C10000-0x0000023ED1C2E000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/4984-412-0x0000023ED2080000-0x0000023ED2090000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5024-583-0x000002D537450000-0x000002D537460000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5024-559-0x000002D537450000-0x000002D537460000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5024-558-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/5024-580-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/5728-619-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/5728-623-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/5796-624-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/5796-625-0x000001BBA01F0000-0x000001BBA0200000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5936-629-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/6008-633-0x00007FFB262C0000-0x00007FFB26D82000-memory.dmp

                                                      Filesize

                                                      10.8MB