Resubmissions

31-01-2025 16:37

250131-t5bw5ssrhn 10

31-01-2025 01:52

250131-car67sxlgs 10

Analysis

  • max time kernel
    97s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2025 01:52

General

  • Target

    2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe

  • Size

    1.2MB

  • MD5

    9c1ad9353ebaf125a5b7b432e428926b

  • SHA1

    bbf3803f1918041a0ae000c0e9a75ee5b2e3dcca

  • SHA256

    f5e3aeee5aec053a0b2cc222787fc4a448c2e7cb1c1241f324910f6eb71ffe18

  • SHA512

    fdadf57cb953c19105460bd5d78aa963e994ab95159dc68cd2f7a19f669746c2898d93c47f60a552d38c765f116111e4288ae1c15fd004e586fef774eb2af581

  • SSDEEP

    12288:ZmHAIqyfF/5ebyz1dpPlRnMRTD410ALP68kG3Jz4S9FUmnyJtgoiOHmabd8ornX9:oHRFfauvpPXnMKqJtfiOHmUd8QTHt

Malware Config

Extracted

Path

C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\!!!HOW_TO_DECRYPT!!!.mht

Ransom Note
From: =?utf-8?B?0RFQctTF0YDQcNC60IXQvdC+IEludGVybmV0IED4cGxvseVyIDEz?= Subject: Date: San, 00 Jan 2000 00:00:00 +0000 MIME-Version: 1.0 Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-MimeOLE: Produced By Microsoft MimeOLE =EF=BB=BF<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "" "">=20 <HTML lang=3D"ru">=20 <HEAD>=20 <META = content=3D"IE = 3D11.0000" http-equiv=3D"X - UA - Compatible">=20 <META charset=3D"utf-8">=20 <TITLE>!!!HOW_TO_DECRYPT!!!</TITLE>=20 <LINK href=3D"style.css" rel=3D"stylesheet">=20 <META name=3D"GENERATOR" content=3D"MSHTML 11.00.10570.1001">=20 </HEAD>=20 <BODY>=20 <p class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><span class=3DSpellE><b>=20 <span lang=3DEN-US style=3D'font-size:20.0pt;font-family:"Times New Roman","serif";mso-bidi-font-family:Arial;color:#C9211E'>=20 All your valiable data has been encrypted!</span></b></span></p><BR><BR>=20 <p class=3DMsoNormal style=3D'text-align:justify;text-justify:inter-ideograph'>=20 <span class=3DSpellE><span lang=3DEN-US style=3D'font-size:13.0pt;font-family:"Times New Roman","serif";mso-bidi-font-family:Arial'>=20 Hello!<BR>Sorry, but we have inform you that your order has been blocked due to the issue of securities. Make sure your data is not blocked.=20 All your valuable files were encrypted with strong encryption algorithms AES-256 + RSA-2048 + CHACHA and renamed. You can read about these algorithms in Google.=20 Your unique encryption key is stored securely on our server and your data can be decrypted quickly and securely.<BR><BR>=20 We can prove that we can decrypt all of your data. Please just send us 3 small encrypted files which are randomly stored on your server.=20 We will decrypt these files and send them to you as a proof. Please note that files for free test decryption should not contain valuable information.<BR><BR>=20 As you know information is the most valuable resource in the world. That's why all of your confidential data was uploaded to our servers.=20 If you need proof, just write us and we will show you that we have your files. If you will not start a dialogue with us in 72 hours=20 we will be forced to publish your files in the Darknet. Your customers and partners will be informed about the data leak by email or phone.<BR><BR>=20 This way, your reputation will be ruined. If you will not react, we will be forced to sell the most important information such as databases=20 to interested parties to generate some profit.<BR><BR>Please understand that we are just doing our job. We don't want to harm your company.=20 Think of this incident as an opportunity to improve your security. We are opened for dialogue and ready to help you. We are professionals,=20 please don't try to fool us.<BR></span></span></p><BR><BR><p class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><b>=20 <span lang=3DEN-US style=3D'font-size:14.0pt;font-family:"Times New Roman","serif";mso-bidi-font-family:Arial'>=20 If you want to resolve this situation,<BR>please write to ALL of these 2 email addresses:<BR>=20 [email protected]<BR>[email protected]<BR>In subject line please write your ID: 2881437549258488974</span></b></p><BR><BR>=20 <p class=3DMsoNormal style=3D'text-align:justify;text-justify:inter-ideograph'><b>=20 <span lang=3DEN-US style=3D'font-family:"Times New Roman","serif";mso-bidi-font-family: Arial;color:#C9211E'>=20 Important!<BR>=20 * We asking to send your message to ALL of our 2 email adresses because for various reasons, your email may not be delivered.<BR>=20 * Our message may be recognized as spam, so be sure to check the spam folder.<BR>=20 * If we do not respond to you within 24 hours, write to us from another email address. Use Gmail, Yahoo, Hotmail, or any other well-known email service.<BR>=20 Important<BR>=20 * Please don't waste the time, it will result only additinal damage to your company!<BR>=20 * Please do not try to decrypt the files yourself. We will not be able to help you if files will be modified.<BR>=20 </span></b></p>=20 <BR>=20 </BODY><BR>=20 </HTML>
URLs

http-equiv=3D"X

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Renames multiple (654) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes System State backups 3 TTPs 2 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Drops file in Drivers directory 13 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 39 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 3 TTPs 13 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3500
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB
      2⤵
      • Interacts with shadow copies
      PID:1800
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded
      2⤵
      • Interacts with shadow copies
      PID:3676
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:2880
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:3840
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:228
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:4108
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:4928
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:4980
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:4196
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:5072
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:880
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:1584
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:1988
    • C:\Windows\SYSTEM32\bcdedit.exe
      bcdedit.exe /set {default} recoveryenabled No
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:3272
    • C:\Windows\SYSTEM32\bcdedit.exe
      bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:2336
    • C:\Windows\SYSTEM32\wbadmin.exe
      wbadmin DELETE SYSTEMSTATEBACKUP
      2⤵
      • Deletes System State backups
      • Drops file in Windows directory
      PID:4364
    • C:\Windows\SYSTEM32\wbadmin.exe
      wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest
      2⤵
      • Deletes System State backups
      • Drops file in Windows directory
      PID:2112
    • C:\Windows\System32\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4616
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2025-0~1.EXE >> NUL
      2⤵
        PID:4440
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3468
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
      1⤵
      • Drops file in System32 directory
      PID:4944

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\!!!HOW_TO_DECRYPT!!!.mht

      Filesize

      4KB

      MD5

      a39a1e2d4ab095bc27c9d070b245cb0c

      SHA1

      36049c25e666c2acb0eb5099ed963f863dca92c7

      SHA256

      6dbcc37af3731fca38427fbdbce73cf6a07252678ef96522a7f883b7ec8b83aa

      SHA512

      424ef986a544a28107a6eac55ccac01f57f1ab7d037e363d03e72ef714c9eeeccdf41ec2b36c4b651fe35620c72cf8510a1007463b90eb9fd4d76bdb9aee000b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2367C848C1C8A11F6F3502EDA2855348.1btc

      Filesize

      824B

      MD5

      a69ed8ef3177a05db11dc6f4d99695b9

      SHA1

      59ba9ee756e7c2032b060ab52f811db72eee1d02

      SHA256

      76f8fd4ceb880f6c5a5391b50471d881699f46b3736ca2947fc6d5f8a31aebab

      SHA512

      5ca087599a6ee7e7b0d337a99f8199a8d8720d929f57dd82b7d739b0ac18d6b9685d265a2df24d53aaa4f74ca291cf24defeba885aab1b91890e16ae29ed59b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\398EE64D66758B5715368AA94044B13A.1btc

      Filesize

      710B

      MD5

      73f90bb8557b16cb8f3ec68338860a72

      SHA1

      f9c20ad0ebfaea3547ae2a52e21a71175f998d2d

      SHA256

      d4ce88bb9ca3954741633d8c8d4953a081cc511d8c9ee9ba000828fbc9678425

      SHA512

      ec915cc1c3ad267a1e3be77810d2d527246296b2990a9c6b77c1f3e3d203c19d3ab565f323dfad5c6ee106e8e612eacce3d7f7dd22b6031d491151f7055e084a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.1btc

      Filesize

      852B

      MD5

      31891c98fe946e0cf71b22efad89ee27

      SHA1

      6176da369d703d9456418f13ec09a67871444868

      SHA256

      1efb48fae351290a78058b5fe07a444c9cabca214907c64527f4b817e8ea8ece

      SHA512

      f814d2cab33656420de195d301fb30524ee5151e11e19ff4bd09185d3f3e4178cc38bc3f1c5831940f10db0435856feef34efcafaf9c32b5770151058cd9e3f9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.1btc

      Filesize

      840B

      MD5

      a994e236f459582372225298b8b551da

      SHA1

      c1777f85db90d96b099f51e0e26a7d5cd9fb4b99

      SHA256

      4e084280a4f7b2d62266ff15558882c0bf4d33f18587649361776449b2bad6e2

      SHA512

      269748b5ad759638aaaebcee081778bca01e452d54717bd8803b82f67eff220aef297dfc6310e00dc0ddcc14bada29b83d368c4adf63cfce757a37ebaf868d4e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F.1btc

      Filesize

      700B

      MD5

      8800860ef764a5ddeab34f81060ae00f

      SHA1

      97089e4aba48b2086abbe2c9ee98d94ae2bdac11

      SHA256

      5776fbbdd3b42804612ea9b789f6e468486cfc7352a987c3a28e7aad79b8b757

      SHA512

      87deed24a734292df2b8d6ed6dc806e5ca176c23f5f0868b1888cc1bef101c67fd9cc296e4946bd89a78fb2b1dbac3e14da901b59c198f800ce64c9ff3729f30

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C86BD7751D53F10F65AAAD66BBDF33C7.1btc

      Filesize

      770B

      MD5

      88d0934a8a85871b03d68283f3e7a6dd

      SHA1

      62dbace92c92352b29dbe9250201a10d70682800

      SHA256

      a5c5e9c4c9111bd1a922171f32942244370cf11bde6318356132781cb1c6a42a

      SHA512

      ff0c7f6aae43a10559b8f8d59d88456acca1238b37f18b0c40961933c42e926290fe1dc11be7a5d391a0b57114fc8ce876f883b509716048e9c922e0ea977e3f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749

      Filesize

      290B

      MD5

      ea83e67c4457d954a9dcdceb2c8ef16d

      SHA1

      1d4812b62c5b53ba0493faffaeed09f3c51da300

      SHA256

      b9c4ace4f91c3889c216e97ba42c121ef5c91cbe1483526b0704dcf962b1338a

      SHA512

      43d735d0fc672b5ecf862ecb8e6c6471bddf611f06dc42339f89400dd69e82d019704460bcefd0c9623da2afb788b6366716bb6b7833b74c8febf046d35e70da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.1btc

      Filesize

      842B

      MD5

      19ecdd40780dab460f4e1414573e98e1

      SHA1

      518757da00b4b7c41827f1e25549afe3acb4be71

      SHA256

      c83183f0f01227ebcfb9163ba4095d6bb7e5ed7f5f3eb00044149f84f17f2962

      SHA512

      4f4aca70b9c9833954e4983e3c3c7779d18faf92e1b24b38b62fc2ab5789605df87df1fae44addc4874d4a588cc0b8fa2365e1751ec00b8d30d99e8525167702

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB5E2F83CE9B8330B0590B7CD2E5FF2E.1btc

      Filesize

      782B

      MD5

      0837dc972d4deab7cf88ff8b58e3c6de

      SHA1

      ca2bd177594c31f5d3a5572460d6df0d48ace6fb

      SHA256

      22b617a9da09805646fa8838b89beba8735b6e9bbe139bd7ad24e85e5507f859

      SHA512

      b6327ba2f66a5c0e4e8c76817a5ff1c1e8e9e5a240f2db061e6d1088c20cfa1ab86c7910864f656eabd94c314c2b124c8c4645dad969a6836156320053f48a7e

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      37KB

      MD5

      df6501476660fea623d46f6e69d1833f

      SHA1

      aa2f278a19bbca118288701e7411a82a97871dcd

      SHA256

      767346658945dd07d8189dbf0bfb9fd70863d53cb5640b2117f2b9f829a5fda9

      SHA512

      f6cf336347e0a71163acae0d823cdc946a5d2574ac9a0819c6c9d87adb59bd20483ee2c4cc5856cd63528bbbeec35e40d63c8638b7dafd033010468bccdc38f3

    • C:\Windows\System32\catroot2\edb.log

      Filesize

      2.0MB

      MD5

      7aba68a57293c763c1d12ccbb0fda3f1

      SHA1

      00c0320b86df0f91656675a93c961cf2f4ef0497

      SHA256

      2dc149b11cba83016bd269602673280ad465cad4a08281115579ddc1ce939018

      SHA512

      9d3ec9a3773f36228cb71c69f6b5b5a72b95da610ba66183df3156f067572386c0480ae83d8966805c468e01baa2b94cefd45e75d1a9478c3e182a351163ad20

    • memory/4944-1956-0x00000235B3260000-0x00000235B3261000-memory.dmp

      Filesize

      4KB

    • memory/4944-1962-0x00000235B4C10000-0x00000235B4C11000-memory.dmp

      Filesize

      4KB

    • memory/4944-1938-0x00000235AE710000-0x00000235AE711000-memory.dmp

      Filesize

      4KB

    • memory/4944-1942-0x00000235AE860000-0x00000235AE861000-memory.dmp

      Filesize

      4KB

    • memory/4944-1943-0x00000235AF570000-0x00000235AF571000-memory.dmp

      Filesize

      4KB

    • memory/4944-1944-0x00000235AFD60000-0x00000235AFD61000-memory.dmp

      Filesize

      4KB

    • memory/4944-1945-0x00000235AFD60000-0x00000235AFD61000-memory.dmp

      Filesize

      4KB

    • memory/4944-1947-0x00000235B03F0000-0x00000235B03F1000-memory.dmp

      Filesize

      4KB

    • memory/4944-1948-0x00000235B1090000-0x00000235B1091000-memory.dmp

      Filesize

      4KB

    • memory/4944-1949-0x00000235B1090000-0x00000235B1091000-memory.dmp

      Filesize

      4KB

    • memory/4944-1951-0x00000235B12F0000-0x00000235B12F1000-memory.dmp

      Filesize

      4KB

    • memory/4944-1952-0x00000235AFEF0000-0x00000235AFEF1000-memory.dmp

      Filesize

      4KB

    • memory/4944-1953-0x00000235B25E0000-0x00000235B25E1000-memory.dmp

      Filesize

      4KB

    • memory/4944-1954-0x00000235B25E0000-0x00000235B25E1000-memory.dmp

      Filesize

      4KB

    • memory/4944-1937-0x00000235AE5E0000-0x00000235AE5E1000-memory.dmp

      Filesize

      4KB

    • memory/4944-1957-0x00000235B3740000-0x00000235B3741000-memory.dmp

      Filesize

      4KB

    • memory/4944-1958-0x00000235B3740000-0x00000235B3741000-memory.dmp

      Filesize

      4KB

    • memory/4944-1960-0x00000235B4300000-0x00000235B4301000-memory.dmp

      Filesize

      4KB

    • memory/4944-1961-0x00000235B4C10000-0x00000235B4C11000-memory.dmp

      Filesize

      4KB

    • memory/4944-1939-0x00000235AE730000-0x00000235AE731000-memory.dmp

      Filesize

      4KB

    • memory/4944-1964-0x00000235B5400000-0x00000235B5401000-memory.dmp

      Filesize

      4KB

    • memory/4944-1965-0x00000235B6060000-0x00000235B6061000-memory.dmp

      Filesize

      4KB

    • memory/4944-1966-0x00000235B6060000-0x00000235B6061000-memory.dmp

      Filesize

      4KB

    • memory/4944-1968-0x00000235B6580000-0x00000235B6581000-memory.dmp

      Filesize

      4KB

    • memory/4944-1969-0x00000235AEA90000-0x00000235AEA91000-memory.dmp

      Filesize

      4KB

    • memory/4944-1970-0x00000235AEA90000-0x00000235AEA91000-memory.dmp

      Filesize

      4KB

    • memory/4944-1972-0x00000235AED30000-0x00000235AED31000-memory.dmp

      Filesize

      4KB

    • memory/4944-1973-0x00000235B8290000-0x00000235B8291000-memory.dmp

      Filesize

      4KB

    • memory/4944-1974-0x00000235B8590000-0x00000235B8591000-memory.dmp

      Filesize

      4KB

    • memory/4944-1975-0x00000235B8590000-0x00000235B8591000-memory.dmp

      Filesize

      4KB

    • memory/4944-1977-0x00000235B08C0000-0x00000235B08C1000-memory.dmp

      Filesize

      4KB

    • memory/4944-1929-0x00000235AE5E0000-0x00000235AE5E1000-memory.dmp

      Filesize

      4KB

    • memory/4944-1926-0x00000235AE500000-0x00000235AE501000-memory.dmp

      Filesize

      4KB

    • memory/4944-1925-0x00000235AE4E0000-0x00000235AE4E1000-memory.dmp

      Filesize

      4KB

    • memory/4944-1924-0x00000235AE3A0000-0x00000235AE3A1000-memory.dmp

      Filesize

      4KB

    • memory/4944-1922-0x00000235AE3A0000-0x00000235AE3A1000-memory.dmp

      Filesize

      4KB

    • memory/4944-1900-0x00000235AE0E0000-0x00000235AE0E1000-memory.dmp

      Filesize

      4KB

    • memory/4944-1892-0x00000235AE300000-0x00000235AE301000-memory.dmp

      Filesize

      4KB

    • memory/4944-1883-0x00000235A9F40000-0x00000235A9F50000-memory.dmp

      Filesize

      64KB

    • memory/4944-1877-0x00000235A9960000-0x00000235A9970000-memory.dmp

      Filesize

      64KB