Resubmissions

30-09-2024 21:45

240930-1l2rsazhpg 10

15-09-2024 22:03

240915-1yl7vsvbpf 10

15-09-2024 20:03

240915-ystcwa1elr 10

20-08-2024 16:21

240820-ttt9cawalj 10

24-06-2024 04:58

240624-fmba1a1djm 10

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-08-2024 16:21

General

  • Target

    v2.exe

  • Size

    121KB

  • MD5

    944ed18066724dc6ca3fb3d72e4b9bdf

  • SHA1

    1a19c8793cd783a5bb89777f5bc09e580f97ce29

  • SHA256

    74ce1be7fe32869dbbfe599d7992c306a7ee693eb517924135975daa64a3a92f

  • SHA512

    a4d23cba68205350ae58920479cb52836f9c6dac20d1634993f3758a1e5866f40b0296226341958d1200e1fcd292b8138c41a9ed8911d7abeaa223a06bfe4ad3

  • SSDEEP

    1536:vjVXKif7kaCtHM7qpo6ZQDtFnNi+ti09or2LkLpLik8ICS4Ao3uZs/WVEdz725sK:J1MZwlLk9Bm3uW/Wud2K36cn/wCY

Malware Config

Extracted

Path

C:\Recovery\8x2iovw-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 8x2iovw. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/39252004CBFE40FD 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/39252004CBFE40FD Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: O6AedIZ/DFpR76eY1Tk2cMUExARUyxx6w8Cu19Sf3r8G1Q9OAT+K5xVBnxmiqJtA DE5uzL2eeTokMAOgbmEJFdw1MsYL3fJ0kv+lnt8zCC6/3YB6K3yIJmtddffeq6gb gV6WSG7lpc5JlATKzoJnTezBYi8KKHZF/j2AeQg1GwPfGtJpT79unJ+pHjmfYcik M9HhM9ie8ZX4ci2sz3uHX3QFuSQ6NMX8Hj4IDrkhGzkQ2YYHVJdwWZsd+LUib8oX jZH5SXQ7y0knpqoRPKUH466EKl5MLw9+x1A/QbjvRcbmcCHIRedHApqSH+f8lTRv Zyl0DKiJetDoxcqMV0EHyn5bjkVJG/a50JMVIhMSOEMEeTzsY/Ucm0uReLzdGRGu 5MxzBT08Awf+FlN6zTp/67uSUkyKoqCC4GHwSYKwEJ2YBvYSAdQghMwU1su8y9r5 sjy2Z9e5jMWJk9nz8V9AOVvmZgFE6brH6mgUKawNhikZ/falURXil+lkgH3fem9E eTZjAcMQwZaG86zBgMBANH26OK/deM+ISrSveHUmtA/Vd3bLVs3JZ6ZnnyOXPHqs 0j9IsJWsCESd/mnLETheX15tQ0D7sqSSQBXzxtn72Aw66KzZmOHnIDW9BkthQNRq uq9Dyb4dEl9JIYHihH4NF/OdEKadhoUPstfmUhxLuQ98Y2pcWQqhZx1rdfGMuFlH v8orXQE8Dzz4Uj8H9aLlFwzkCjPcTOatlM56hJ3VFp+dVYuYOXJqMmLOA2MRkmNs Q2KL6jNYR3d7Rb8cNl71OTl8C+OHApFzvTPW9bbXaUljZcl37GPNexKJaK8PVMwI wq+VJUpGqiAr/Bwpf9zbVXgWikeUDrXjDD1LJqay5rSaTHzt500tks+3mPxpRxzb smuWWhUXxaqHor3vPqXx4FqKKpChhGYgc2awIHR8VK4vjYLn7ns3QNbYqSml4DVg 0yj8weZn3UY0TgLrHjHvmyV1wL5N5gKMAtCPjXMpi6Cs3NovAY9SQtNe2UzHQ1MV Vqp4hi4N0oNonxYS0cVmRR7mJ+GjLVYdhlRQjcnYxN2ydTuzyJkn/DD0H8vIFax6 Qk7Avcr+4429r1waDErKJBpMirrZiBaZhoMjSuOFu7q54w9UsndA4uOXNii67rkr 4cf1SleSaGOIgzW5NVME29PwCDJBdWgy0OPk2pE2hVzECJZc3csXFVeNzWwCbaw0 pA+OaPIugFy36nlMU/EuncTKS7uBNcbpJgSeIPKihQFe9s81iF+M+eGSt1ch3NjJ 5pQbBGno5zWjeDO5YWdkU98stRpxJvKpFMtKK4Khxd8/UYyw0H7cS0jb3HDQnyDc e5izr/5NQxmzxasWUV9A6g== ----------------------------------------------------------------------------------------- We will use the data gathered from your systems in future campaigns in 14 days !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/39252004CBFE40FD

http://decoder.re/39252004CBFE40FD

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 23 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\v2.exe
    "C:\Users\Admin\AppData\Local\Temp\v2.exe"
    1⤵
    • Drops startup file
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:748
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1792
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:312
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3532
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe"
        2⤵
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4960
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4960.0.1582776055\800801600" -parentBuildID 20221007134813 -prefsHandle 1616 -prefMapHandle 1608 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0874d4e-51fc-4f91-a15b-08601cc73e80} 4960 "\\.\pipe\gecko-crash-server-pipe.4960" 1748 200c0bf8d58 gpu
          3⤵
            PID:3500
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4960.1.826962335\1922165798" -parentBuildID 20221007134813 -prefsHandle 2100 -prefMapHandle 2096 -prefsLen 20828 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71624092-66f7-4582-a148-2c39337ad5a5} 4960 "\\.\pipe\gecko-crash-server-pipe.4960" 2120 200ae3df258 socket
            3⤵
              PID:1776
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4960.2.387807622\1993426764" -childID 1 -isForBrowser -prefsHandle 3164 -prefMapHandle 3160 -prefsLen 20866 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd021b9f-fe29-40c7-9b79-0959bfe401f7} 4960 "\\.\pipe\gecko-crash-server-pipe.4960" 3008 200c45a6458 tab
              3⤵
                PID:5352
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4960.3.161137493\104533494" -childID 2 -isForBrowser -prefsHandle 3120 -prefMapHandle 3324 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8a7ac084-d285-418e-8a44-433a8bf89160} 4960 "\\.\pipe\gecko-crash-server-pipe.4960" 3344 200c300c958 tab
                3⤵
                  PID:6928
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe"
              1⤵
                PID:6180
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe"
                  2⤵
                  • Checks processor information in registry
                  PID:6484
              • C:\Program Files\7-Zip\7zFM.exe
                "C:\Program Files\7-Zip\7zFM.exe"
                1⤵
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                PID:4464
              • C:\Windows\system32\taskmgr.exe
                "C:\Windows\system32\taskmgr.exe" /4
                1⤵
                • Drops file in Windows directory
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:6864
              • C:\Program Files\VideoLAN\VLC\vlc.exe
                "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\TraceJoin.M2TS"
                1⤵
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:5964
              • C:\Windows\System32\rundll32.exe
                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                1⤵
                  PID:5984
                • C:\Windows\system32\NOTEPAD.EXE
                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\8x2iovw-readme.txt
                  1⤵
                    PID:6308

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Recovery\8x2iovw-readme.txt

                    Filesize

                    7KB

                    MD5

                    fd7e2a978a5d06476928994a8f051c23

                    SHA1

                    d294e077fe02c6f099e95f4222838e5152173c98

                    SHA256

                    fd60ae1d59018894cdac293fb61e222ba62f91cdbb044d81b7b6b70ec3a3dbb7

                    SHA512

                    3e174e287f0a2f4ee5354562638b701db1f1453127b841061fd9f4bd431e398317739be675470cb61e37293dc68b69633163fb2d62324ddbaab6ea046aa83fdc

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\cert9.db

                    Filesize

                    224KB

                    MD5

                    bfa880d0eeb3b7eadb693ec03584cb63

                    SHA1

                    fbb420dbf493fee800cac93e3394ee06dd12f275

                    SHA256

                    97303e630a2acd9f06a5fd02aaf02d17f0f308d46d9f370e54ff8935d4b43abe

                    SHA512

                    4f53093149bff6f91183d7585694c941b09d464a2a5e737a3a13b151e886a1d51e043a79b8d09f64bedded3194677894a9bcb570f78eab16a003c45c16e108e4

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\cert9.db-journal

                    Filesize

                    32KB

                    MD5

                    66f2c8cdf5085f5901603d92e90bcd68

                    SHA1

                    248e63ff7017887b47452adde89a333fea04687b

                    SHA256

                    e11d6406659c93702958e480a21f9588c4515ba46d401feee70a86edcec4c695

                    SHA512

                    373786a67b54470656ecbe59fb25d2a9c8b327fea0df49623f0c639769d163459f16bdc3fc3dc3ea5d5ffa7b295726a7f16bb4c7648bc39515994b43f6938899

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\compatibility.ini

                    Filesize

                    200B

                    MD5

                    170ce2c50c8496fe8d0d2febfa08c06e

                    SHA1

                    f4b26b8d9fec9a9a7514b8c66a427d021510a375

                    SHA256

                    75f315800fe5caa702c2fc68b93dde1749fca7fc4d68cf5b08ea4bcd8dbf8387

                    SHA512

                    2077c20a8d1840932f09d64233dae145288c30c7c3159fa5c1933928ce9a8710077c7027dfc78efd1062510a0e53f37a4342228f2d845410103642c4c45ec786

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    2KB

                    MD5

                    0be4229ea686dcce242df609856208bd

                    SHA1

                    d3b0da379de81dfb90e74caef483478ce65e00f6

                    SHA256

                    ab8e91b595d296b67ab9a89717c14bc8e12098a1ee05a7e2beee08f72643c767

                    SHA512

                    4a040b32e49e1b58aabbf81116f2c7ad8717d120f25ad6f8f1a2c74cb4ac83a36579ddf3f7598843a2405a822ba524cdd275f46586d71f2b45a690c709c0eaa9

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\datareporting\glean\pending_pings\26a6ab26-f133-4863-a10e-c182ad2b8c79

                    Filesize

                    746B

                    MD5

                    5baf3a50fd216603fa58d13222469475

                    SHA1

                    de499905f2e6f983b30f920f980052c73dcd5e92

                    SHA256

                    f594102c071763a38bb0e7348a0f4c42d0b9fc35ffb69f8895d824ac01a777d6

                    SHA512

                    ea832e1ab96709cb848682bd374b7c3a8552553f45c8b2cca30091b32eb6800272c4ee860c37315c415c941fe19d62a9501a9654a13968c027fc3026164639b7

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\datareporting\glean\pending_pings\6a5c630e-2265-4476-a127-b7953ee3cba5

                    Filesize

                    10KB

                    MD5

                    4165b314b4c6339a1a7ac5c33b17a26b

                    SHA1

                    bbb15bcb439aa87f29f69f77ca5491c28436d77d

                    SHA256

                    db7cc8479c91926226ca774805de324da9c1af953e820bea4d451d348c4ee6e8

                    SHA512

                    ec04cf2ae76f1544b9481a6cf817c8a17999bd3c926cd42a3bc489186b4a7b481f54f6cf8a45a16be5c85d97442a233bc9fb6c4c6b2e7947fb6534525b48f0ed

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    ab46f1aa54eff373a2871fcf62d5bf26

                    SHA1

                    fb20c8cc24b522c7d1fcbe23101503cfe271d48d

                    SHA256

                    4ba07f71856fea0692b8e745a6cb1b78c6b27a2b36daaee154ee2faa030d3f56

                    SHA512

                    cc33e900545d83c744fc8260e5ef76394044c1139325ec975650795aebe07a1e52a3b97408f99a084f89646c389a44ebdc0dfd95037e95c0f50bb82e3c212469

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\prefs-2.js

                    Filesize

                    6KB

                    MD5

                    531e245ce4ebf51e1b2847c8458aafe3

                    SHA1

                    4d5607eddd2aa15043f81ca6123b63fc6f51d1f8

                    SHA256

                    ef48545375ff3070c68ad50a71dfba81ba22402f4a306d15e4957282df1a7782

                    SHA512

                    c312975cea2cb00be387ad51bad00b6f730d50d8615df1cc5f0c547eb8e812e5463cb7725987d4e85fd4ecdf6ca06014b7c8e296669d4435387b54405a91a181

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\prefs.js

                    Filesize

                    6KB

                    MD5

                    d5af7e8435dd8eb42e8ca28a6c47b6c4

                    SHA1

                    e65cc8f09887a7396ab018865b0b500aaa7b7aeb

                    SHA256

                    e02f17403507b330c346935c0204650ce5a3d95ef09a821ecd0f5e11da570f73

                    SHA512

                    c5cfbc4a6062a5fcd15cd0b0f4578021e7a6ad153c69b7bc3f5762aded69b11723c86eede4d24cb88855a8eac76a22d7de7f71f6c90c8442536b1d20b96945d3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\prefs.js

                    Filesize

                    6KB

                    MD5

                    034bd49488dddba1cf7b489d846aa0d9

                    SHA1

                    77699aa72691220d67708e9be190b2e0b401e7a7

                    SHA256

                    760f68647c08f79ba1b8086706bac1d6ca08f16132f77dc648e65e23fd41394e

                    SHA512

                    0fe491ed42470d3aa2c67e73ed23ae19cbfff99b7c49177a8fa7c159e3dc06b70a40afacb25b3ee74966f3619c6363df765eded285ec689163b790d4af669c62

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\protections.sqlite

                    Filesize

                    64KB

                    MD5

                    deeced8825e857ead7ba3784966be7be

                    SHA1

                    e72a09807d97d0aeb8baedd537f2489306e25490

                    SHA256

                    b9f022442a1506e592bf51284091a8a7fe17580b165d07e70c06fd6827343a54

                    SHA512

                    01d303232d6481af322137b44fef6c2a584f0643c48bab2836f9fe3193207015da7f7514fe338500ae4469651e3d9618293858ae507e722198a249257677099e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\sessionCheckpoints.json

                    Filesize

                    53B

                    MD5

                    ea8b62857dfdbd3d0be7d7e4a954ec9a

                    SHA1

                    b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a

                    SHA256

                    792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da

                    SHA512

                    076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\sessionCheckpoints.json

                    Filesize

                    90B

                    MD5

                    c4ab2ee59ca41b6d6a6ea911f35bdc00

                    SHA1

                    5942cd6505fc8a9daba403b082067e1cdefdfbc4

                    SHA256

                    00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                    SHA512

                    71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                  • memory/5964-5842-0x00007FF992A00000-0x00007FF992A34000-memory.dmp

                    Filesize

                    208KB

                  • memory/5964-5841-0x00007FF62E250000-0x00007FF62E348000-memory.dmp

                    Filesize

                    992KB

                  • memory/5964-5843-0x00007FF990010000-0x00007FF9902C6000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/5964-5844-0x00007FF983310000-0x00007FF9843C0000-memory.dmp

                    Filesize

                    16.7MB