Analysis

  • max time kernel
    144s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-07-2024 07:53

General

  • Target

    2024-07-03_728cb2fb25ddc3b86db2e1f72cf48dd3_medusalocker.exe

  • Size

    1.3MB

  • MD5

    728cb2fb25ddc3b86db2e1f72cf48dd3

  • SHA1

    2bd7722674d804c3087d63a51fe0287ff04229d9

  • SHA256

    6112da76e670a9c450c3f55c1bcafe22ddd199983470ab8d7e24c03688524387

  • SHA512

    450b947b902e8119a6166bdef63dfca0dc0aa51b008d31247f68402929dc0feec9467c3497c72ec3bfd56269989baff2b5bf6e9b3aa92b6ba0f44d77c0e802b9

  • SSDEEP

    12288:QmHAIqyfF/5ebyz1dpPlRnMRTD410ALP68kG3Jz4S9FUmnyJtgoiOHmabd8ornXn:HHRFfauvpPXnMKqJtfiOHmUd8QTH3

Malware Config

Extracted

Path

\Device\HarddiskVolume1\Boot\da-DK\!!!HOW_TO_DECRYPT!!!.mht

Ransom Note
From: =?utf-8?B?0RFQctTF0YDQcNC60IXQvdC+IEludGVybmV0IED4cGxvseVyIDEz?= Subject: Date: San, 00 Jan 2000 00:00:00 +0000 MIME-Version: 1.0 Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft MimeOLE =EF=BB=BF<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "" "">=20 <HTML lang=3D"ru">=20 <HEAD>=20 <META = content=3D"IE = 3D11.0000" http-equiv=3D"X - UA - Compatible">=20 <META charset=3D"utf-8">=20 <TITLE>!!!HOW_TO_DECRYPT!!!</TITLE>=20 <LINK href=3D"style.css" rel=3D"stylesheet">=20 <META name=3D"GENERATOR" content=3D"MSHTML 11.00.10570.1001">=20 </HEAD>=20 <BODY>=20 <p class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><span class=3DSpellE><b>=20 <span lang=3DEN-US style=3D'font-size:20.0pt;font-family:"Times New Roman","serif";mso-bidi-font-family:Arial;color:#C9211E'>=20 All your valiable data has been encrypted!</span></b></span></p><BR><BR>=20 <p class=3DMsoNormal style=3D'text-align:justify;text-justify:inter-ideograph'>=20 <span class=3DSpellE><span lang=3DEN-US style=3D'font-size:13.0pt;font-family:"Times New Roman","serif";mso-bidi-font-family:Arial'>=20 Hello!<BR>Sorry, but we have inform you that your order has been blocked due to the issue of securities. Make sure your data is not blocked.=20 All your valuable files were encrypted with strong encryption algorithms AES-256 + RSA-2048 + CHACHA and renamed. You can read about these algorithms in Google.=20 Your unique encryption key is stored securely on our server and your data can be decrypted quickly and securely.<BR><BR>=20 We can prove that we can decrypt all of your data. Please just send us 3 small encrypted files which are randomly stored on your server.=20 We will decrypt these files and send them to you as a proof. Please note that files for free test decryption should not contain valuable information.<BR><BR>=20 As you know information is the most valuable resource in the world. That's why all of your confidential data was uploaded to our servers.=20 If you need proof, just write us and we will show you that we have your files. If you will not start a dialogue with us in 72 hours=20 we will be forced to publish your files in the Darknet. Your customers and partners will be informed about the data leak by email or phone.<BR><BR>=20 This way, your reputation will be ruined. If you will not react, we will be forced to sell the most important information such as databases=20 to interested parties to generate some profit.<BR><BR>Please understand that we are just doing our job. We don't want to harm your company.=20 Think of this incident as an opportunity to improve your security. We are opened for dialogue and ready to help you. We are professionals,=20 please don't try to fool us.<BR></span></span></p><BR><BR><p class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><b>=20 <span lang=3DEN-US style=3D'font-size:14.0pt;font-family:"Times New Roman","serif";mso-bidi-font-family:Arial'>=20 If you want to resolve this situation,<BR>please write to ALL of these 2 email addresses:<BR>=20 [email protected]<BR>[email protected]<BR>In subject line please write your ID: 18353024742028096978</span></b></p><BR><BR>=20 <p class=3DMsoNormal style=3D'text-align:justify;text-justify:inter-ideograph'><b>=20 <span lang=3DEN-US style=3D'font-family:"Times New Roman","serif";mso-bidi-font-family: Arial;color:#C9211E'>=20 Important!<BR>=20 * We asking to send your message to ALL of our 2 email adresses because for various reasons, your email may not be delivered.<BR>=20 * Our message may be recognized as spam, so be sure to check the spam folder.<BR>=20 * If we do not respond to you within 24 hours, write to us from another email address. Use Gmail, Yahoo, Hotmail, or any other well-known email service.<BR>=20 Important<BR>=20 * Please don't waste the time, it will result only additinal damage to your company!<BR>=20 * Please do not try to decrypt the files yourself. We will not be able to help you if files will be modified.<BR>=20 </span></b></p>=20 <BR>=20 </BODY><BR>=20 </HTML>
URLs

http-equiv=3D"X

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Renames multiple (749) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes System State backups 3 TTPs 2 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Drops file in Drivers directory 13 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 39 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 3 TTPs 13 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-03_728cb2fb25ddc3b86db2e1f72cf48dd3_medusalocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-03_728cb2fb25ddc3b86db2e1f72cf48dd3_medusalocker.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3848
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB
      2⤵
      • Interacts with shadow copies
      PID:1688
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded
      2⤵
      • Interacts with shadow copies
      PID:2052
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:4816
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:4936
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:2628
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:2584
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:800
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:5108
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:728
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:3016
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:1400
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:2732
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:2616
    • C:\Windows\SYSTEM32\bcdedit.exe
      bcdedit.exe /set {default} recoveryenabled No
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:2104
    • C:\Windows\SYSTEM32\bcdedit.exe
      bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:4684
    • C:\Windows\SYSTEM32\wbadmin.exe
      wbadmin DELETE SYSTEMSTATEBACKUP
      2⤵
      • Deletes System State backups
      • Drops file in Windows directory
      PID:1540
    • C:\Windows\SYSTEM32\wbadmin.exe
      wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest
      2⤵
      • Deletes System State backups
      • Drops file in Windows directory
      PID:300
    • C:\Windows\System32\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2896
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE >> NUL
      2⤵
        PID:4380
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4560
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4108,i,12594301322143882025,16832588342008839449,262144 --variations-seed-version --mojo-platform-channel-handle=4296 /prefetch:8
      1⤵
        PID:756
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
        1⤵
        • Drops file in System32 directory
        PID:2160

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2367C848C1C8A11F6F3502EDA2855348.1btc

        Filesize

        824B

        MD5

        dd2fd021c5e67b19c550218403215b2d

        SHA1

        fc31b2edc263a971a98a2504945273379d9d296a

        SHA256

        36dbc1fe9451872c6f5e0178fdc7dc6066d41018dec607852f6b830f55e9e72f

        SHA512

        5c2c3b93c0cb64924bf93a47101bfd9d36a9352f5c0c6eaf430cc8563ae4f63e20b48a3f94dbd205b9d4ebbcdab515a6752fa08b0a567df00729cac71423f486

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.1btc

        Filesize

        814B

        MD5

        40cde007a09354d3987f611037c6e7fe

        SHA1

        fb59d9dea777f3bc3ef8eb1d91c6ed8cf413f4fe

        SHA256

        2ab8ab8b20b59e38f7b284e593bc6510490a41ca53283855afeefbeef602aea3

        SHA512

        a84582533d087b4d2063ecce92c8b14f327e3f0ec492242b9d28556cb1887fd8fde7b8676a8b621cc1700bbac84626ceb299b7ffae29fbeb831b28a5512be5e0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.1btc

        Filesize

        840B

        MD5

        3e6371f7696d2b943122e57bbd07c73e

        SHA1

        fb9cb7572522152b55d0c4becfed314237009b80

        SHA256

        92927dd6c6bc12e3ec8afafcc635fec0adc076b7045998ae5e5cfad946ab75db

        SHA512

        56705434da09efae752259b95bd1ad64373d44f7bc01b4b4b205ec0ccf3acdbc06fd082c19ea534a2f2d752a7974d372907d2438445acb5650654bcb234835b5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F.1btc

        Filesize

        700B

        MD5

        8f16322fd472df3df24b77fe5b640831

        SHA1

        cc03190b53164f728540bd5a6a9c35558efe71e1

        SHA256

        1f9603f4a411e90024f5efd968494b15477acd9dc0058b4d1f58457717be7684

        SHA512

        d62522bff769b09052c77f1c2970bf044dfe6092c42e37b5be10f46689aa1433bae40deb6f72a97cb472954159238ff636299ef269d12d3aa1e829c03660e45f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C86BD7751D53F10F65AAAD66BBDF33C7.1btc

        Filesize

        770B

        MD5

        a57b3314842e438a402845664c5a712c

        SHA1

        af83a808fa45ce462500d6cb61f24af2cee41e26

        SHA256

        4ef732e3203cb38e59860e3f4108edfe0ddae7c4690e81066f65c7144f36c771

        SHA512

        39e312115e49787be5331d673c5931b21a4569b62f6421cdacb6391bb3181e23baa99db0f89ec6c7c651f82535cd39393c9107bf486f1ef2a1be1000727a661b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.1btc

        Filesize

        842B

        MD5

        d782b2b76bd62631a1cd97c6152ddf44

        SHA1

        eb6901ac4258096ea7ef57225377e450f1e2329a

        SHA256

        30a36ff7cb2bc04fdbe9723538010c2e7743319fb9b432a39a3e6f2a6551dda8

        SHA512

        7244d6ac7a440815c32ebbb0617832106fd2fc523e4784bff39963f4fd24668d9e38de365de68bce51b7b4885a2a81b852a62280e051e9c32ca486ddd8a12bad

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB5E2F83CE9B8330B0590B7CD2E5FF2E.1btc

        Filesize

        782B

        MD5

        394c681087090cd33edf9f964b1c89dd

        SHA1

        79dc6e6add82cc2e804f898880c9a6dd7fc7d4fe

        SHA256

        1045cf58e84a8940941edd2642f1924d8f80ad5f3a65d2169b9e57a51acdb74c

        SHA512

        1a862abc310a9e7cad24fdb6b527b90c3aa44a5dd039de896dd322c0c4b0939a759eec7a78884b25e399dfd9e891ab7226234f2c0516c44ddd33a4dbdd2ea9c3

      • C:\Windows\System32\catroot2\dberr.txt

        Filesize

        21KB

        MD5

        c86cedc42593804f87298422df863048

        SHA1

        352cb37b02b37c4715cef9d5cd778e47b36e0dbc

        SHA256

        39d4d4a99c565d4a8cfc11a6bbbb29ee6dcd842c44e1a1f7f676c8704402d2ec

        SHA512

        40bb21b08889f6ca42b585ba24506ec8ca9c0954150c8733a5964cec5e2249aec9682f8db3185712e6977dbb44b03a3c76b0637047c90a939997cc91a4bdf5e5

      • C:\Windows\System32\catroot2\edb.log

        Filesize

        2.0MB

        MD5

        50b6087229fa8fb28c5292f0bdf89cc3

        SHA1

        50dd6d623e2ae98b237f9db5989badf5a019018a

        SHA256

        043dfd802b665f0bf70e529466c989ce64d4ec15276623c658a65ced433ddb80

        SHA512

        5b9e10ee9e1ebf115dafe435789695b7b48bfb192f085efe63cb91c2a861441515787ca4d9d680dcabd552e686f2051f8702b011dde063519c3b3caeb7331edb

      • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.1btc

        Filesize

        850B

        MD5

        9764f50d9253c71ff6f2cce5ee5259b7

        SHA1

        bc4dc81af5b7d601cff4149ac8de0e66343559f9

        SHA256

        6f891e54e3a8530d64d7b46375340265110f2669fee4dbc8eab50f866e60db80

        SHA512

        72d3f3fc75d68469d500532eb6565f1b8b96e1f9c2b7a5a430954c789863bcef434ff3365707d5fe6d49deb990c72b3df9030a86dc4dbfaedce4423eb077affd

      • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.1btc

        Filesize

        802B

        MD5

        11e35a762d17df6fc34f64bacc15fdc8

        SHA1

        c2ede44818b5bab929bb058e479da0b5a5936a5a

        SHA256

        274fd3ea239cf964de5b10a4274becf5a7956596235cdf610612ae5604f05dd2

        SHA512

        bd369d4fda05b0cf44f5a444f6d29b331b683e46e8f795141875c885ea950ef575d4ae9d647ed3091cb37f757270a9179866b9a3daaac7c6505b65ed3a00f239

      • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.1btc

        Filesize

        842B

        MD5

        4f0e193b4cc3ad1cf37cb5ba68fbd062

        SHA1

        9494554878747cb108854d301cca8382668875eb

        SHA256

        32ca540d3b758cea736355e8e088574f4d0c9c26c6296f4226ceef95bb94e456

        SHA512

        b3f8093b5552fc740518384ff3e031ad134111d27a7aca8684ea0195f2a2815a45acc0b19ab2ced4733698b5ba2772ac0b5d436bf3f16f661237655b59f90a09

      • \Device\HarddiskVolume1\Boot\da-DK\!!!HOW_TO_DECRYPT!!!.mht

        Filesize

        4KB

        MD5

        92584b6066f5807eeaa4161445263a37

        SHA1

        15f954d1962c25fb517d1a3c851d4311d4b51ec3

        SHA256

        a42756667286ee85880ec7d1e83ad20c26d79a80bd1379e557ce1ec53af6f707

        SHA512

        5c604feceeb4136392145ef180cb8549e748c552e6ab672a7aab219a74a21c57c9e015fb842c2206370e0c6ef8da2f32073efbe70f4ee9df714be02e1ba1ff2c

      • memory/2160-942-0x000001D3C18F0000-0x000001D3C18F1000-memory.dmp

        Filesize

        4KB

      • memory/2160-950-0x000001D3C3F00000-0x000001D3C3F01000-memory.dmp

        Filesize

        4KB

      • memory/2160-930-0x000001D3BCFA0000-0x000001D3BCFA1000-memory.dmp

        Filesize

        4KB

      • memory/2160-931-0x000001D3BDCB0000-0x000001D3BDCB1000-memory.dmp

        Filesize

        4KB

      • memory/2160-933-0x000001D3BE410000-0x000001D3BE411000-memory.dmp

        Filesize

        4KB

      • memory/2160-932-0x000001D3BE410000-0x000001D3BE411000-memory.dmp

        Filesize

        4KB

      • memory/2160-935-0x000001D3BCEB0000-0x000001D3BCEB1000-memory.dmp

        Filesize

        4KB

      • memory/2160-936-0x000001D3BF920000-0x000001D3BF921000-memory.dmp

        Filesize

        4KB

      • memory/2160-938-0x000001D3BDE10000-0x000001D3BDE11000-memory.dmp

        Filesize

        4KB

      • memory/2160-937-0x000001D3BDE10000-0x000001D3BDE11000-memory.dmp

        Filesize

        4KB

      • memory/2160-940-0x000001D3C0740000-0x000001D3C0741000-memory.dmp

        Filesize

        4KB

      • memory/2160-941-0x000001D3C17F0000-0x000001D3C17F1000-memory.dmp

        Filesize

        4KB

      • memory/2160-943-0x000001D3C0680000-0x000001D3C0681000-memory.dmp

        Filesize

        4KB

      • memory/2160-926-0x000001D3BCE50000-0x000001D3BCE51000-memory.dmp

        Filesize

        4KB

      • memory/2160-945-0x000001D3C28D0000-0x000001D3C28D1000-memory.dmp

        Filesize

        4KB

      • memory/2160-947-0x000001D3C2BA0000-0x000001D3C2BA1000-memory.dmp

        Filesize

        4KB

      • memory/2160-946-0x000001D3C2BA0000-0x000001D3C2BA1000-memory.dmp

        Filesize

        4KB

      • memory/2160-949-0x000001D3C3960000-0x000001D3C3961000-memory.dmp

        Filesize

        4KB

      • memory/2160-951-0x000001D3C3F00000-0x000001D3C3F01000-memory.dmp

        Filesize

        4KB

      • memory/2160-927-0x000001D3BCE70000-0x000001D3BCE71000-memory.dmp

        Filesize

        4KB

      • memory/2160-953-0x000001D3C4BC0000-0x000001D3C4BC1000-memory.dmp

        Filesize

        4KB

      • memory/2160-955-0x000001D3BCD60000-0x000001D3BCD61000-memory.dmp

        Filesize

        4KB

      • memory/2160-954-0x000001D3BCD60000-0x000001D3BCD61000-memory.dmp

        Filesize

        4KB

      • memory/2160-957-0x000001D3BF9F0000-0x000001D3BF9F1000-memory.dmp

        Filesize

        4KB

      • memory/2160-958-0x000001D3C6A20000-0x000001D3C6A21000-memory.dmp

        Filesize

        4KB

      • memory/2160-960-0x000001D3C6A90000-0x000001D3C6A91000-memory.dmp

        Filesize

        4KB

      • memory/2160-959-0x000001D3C6A90000-0x000001D3C6A91000-memory.dmp

        Filesize

        4KB

      • memory/2160-962-0x000001D3C7A30000-0x000001D3C7A31000-memory.dmp

        Filesize

        4KB

      • memory/2160-964-0x000001D3C48D0000-0x000001D3C48D1000-memory.dmp

        Filesize

        4KB

      • memory/2160-963-0x000001D3C48D0000-0x000001D3C48D1000-memory.dmp

        Filesize

        4KB

      • memory/2160-925-0x000001D3BCD20000-0x000001D3BCD21000-memory.dmp

        Filesize

        4KB

      • memory/2160-923-0x000001D3BCD20000-0x000001D3BCD21000-memory.dmp

        Filesize

        4KB

      • memory/2160-920-0x000001D3BCC40000-0x000001D3BCC41000-memory.dmp

        Filesize

        4KB

      • memory/2160-919-0x000001D3BCC20000-0x000001D3BCC21000-memory.dmp

        Filesize

        4KB

      • memory/2160-918-0x000001D3BCAE0000-0x000001D3BCAE1000-memory.dmp

        Filesize

        4KB

      • memory/2160-916-0x000001D3BCAE0000-0x000001D3BCAE1000-memory.dmp

        Filesize

        4KB

      • memory/2160-894-0x000001D3BC820000-0x000001D3BC821000-memory.dmp

        Filesize

        4KB

      • memory/2160-886-0x000001D3BCA40000-0x000001D3BCA41000-memory.dmp

        Filesize

        4KB

      • memory/2160-877-0x000001D3B8740000-0x000001D3B8750000-memory.dmp

        Filesize

        64KB

      • memory/2160-871-0x000001D3B7F90000-0x000001D3B7FA0000-memory.dmp

        Filesize

        64KB