Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 00:01

General

  • Target

    a23a6c4af10ac9eb38c1422fb7368958a41662bd52a157c63217c117f31dfade.exe

  • Size

    74KB

  • MD5

    0437b59f19460ba53d1f033cbb8a9fa6

  • SHA1

    2baa467d0d736d331fdd59404099efe2786035d6

  • SHA256

    a23a6c4af10ac9eb38c1422fb7368958a41662bd52a157c63217c117f31dfade

  • SHA512

    da6bf2d6e34dcbf5f478bc06ab95814ada5569fc5a10eeb75692ae7385f4173a48600714039ad054c982ca1d1032660e6e7eb09fbc95342df84a2713da48b7c1

  • SSDEEP

    1536:8+py7ZZA7zCCt4aUXrLOyJMf6IGv7U7jjcDSEYUu3LIxL3sgH2KRKpzZ:882kj4aUXr+wDU78DhYYxLzeZ

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Executes dropped EXE 2 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a23a6c4af10ac9eb38c1422fb7368958a41662bd52a157c63217c117f31dfade.exe
    "C:\Users\Admin\AppData\Local\Temp\a23a6c4af10ac9eb38c1422fb7368958a41662bd52a157c63217c117f31dfade.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Program Files\FreeRapid\loader.tmp
      "C:\Program Files\FreeRapid\loader.tmp"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4696
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c afc9fe2f418b00a0.bat
        3⤵
          PID:4004
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\socketmouse1.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\1.bat
          3⤵
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:1316
          • C:\PROGRA~1\INTERN~1\iexplore.exe
            C:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?82133
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4312
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4312 CREDAT:17410 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3704
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\1.inf
            4⤵
              PID:1988
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\2.bat
              4⤵
              • Drops file in Program Files directory
              • Suspicious use of WriteProcessMemory
              PID:3852
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?r"" /f
                5⤵
                • Modifies Internet Explorer settings
                • Modifies Internet Explorer start page
                PID:2176
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?r"" /f
                5⤵
                • Modifies Internet Explorer settings
                • Modifies Internet Explorer start page
                PID:4660
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?r"" /f
                5⤵
                  PID:3016
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f
                  5⤵
                  • Modifies registry class
                  PID:3820
                • C:\Windows\SysWOW64\attrib.exe
                  attrib +s +h C:\PROGRA~1\FREERA~1\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}
                  5⤵
                  • Sets file to hidden
                  • Drops file in Program Files directory
                  • Views/modifies file attributes
                  PID:760
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\PROGRA~1\FREERA~1\3.bat""" /f
                  5⤵
                  • Modifies registry class
                  PID:4488
                • C:\Windows\SysWOW64\attrib.exe
                  attrib +s +h C:\PROGRA~1\FREERA~1\tmp
                  5⤵
                  • Sets file to hidden
                  • Drops file in Program Files directory
                  • Views/modifies file attributes
                  PID:4788
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\2.inf
                  5⤵
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:820
                  • C:\Windows\SysWOW64\runonce.exe
                    "C:\Windows\system32\runonce.exe" -r
                    6⤵
                    • Checks processor information in registry
                    • Suspicious use of WriteProcessMemory
                    PID:4784
                    • C:\Windows\SysWOW64\grpconv.exe
                      "C:\Windows\System32\grpconv.exe" -o
                      7⤵
                        PID:3676
                  • C:\Windows\SysWOW64\rundll32.exe
                    rundll32 C:\Progra~1\FreeRapid\1.bin,MainLoad
                    5⤵
                    • Loads dropped DLL
                    • Drops file in Program Files directory
                    PID:4112
            • C:\Users\Admin\AppData\Local\Temp\inl2AEA.tmp
              C:\Users\Admin\AppData\Local\Temp\inl2AEA.tmp
              2⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2600
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl2AEA.tmp > nul
                3⤵
                  PID:2740
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A23A6C~1.EXE > nul
                2⤵
                  PID:1356

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\PROGRA~1\FREERA~1\1.bat

                Filesize

                3KB

                MD5

                2b99b7f66b8ebba3071330bcbaccc022

                SHA1

                1a79cdcdd4dd3c9e22b45acdbc20a51da5f23e52

                SHA256

                3ed44f8ec4dd76cadb989353a1ed4a578d93fbba2eb0997443000384e2fb7f09

                SHA512

                03671ec8fbe45df652bddf47141fd017cfd86b25c034608be23eb82035b3e7504765d4fdc9c42e1bbb3de4b132476a5e7156d83fe1982be283c9ea51e9cc8671

              • C:\PROGRA~1\FREERA~1\1.inf

                Filesize

                492B

                MD5

                34c14b8530e1094e792527f7a474fe77

                SHA1

                f71c4e9091140256b34c18220d1dd1efab1f301d

                SHA256

                fe0dfb3458bfe2a3632d365e00765fa10f14d62e7dfa8b70a055c7eb9fdb6713

                SHA512

                25bb09b526e1e9f5c6052f1f7c36b37c956c1b5649936af8df3abfcf120c931f3d2603e17a061cb99d8c8074bfb1973a5423cce89762fca53cd46aeb3e8944a2

              • C:\PROGRA~1\FREERA~1\2.bat

                Filesize

                3KB

                MD5

                33a04456ee815ae4a4cdafc50e0c6910

                SHA1

                69c8d3408e9c88ce3300b377a5acd0e13aec2b0f

                SHA256

                47bc8bd2bae6685b6d66bd8b5ed945214ac37a934a7e6ae3c0f1f85192e965f5

                SHA512

                4f61b3d6e3923d491f60dc9602b39f14a485f8d4f7c2122b7ee4c831d1620689c70c99d52212306969d850c9607c61c69bb96ea7fe922d9d7feab7eae90d2afd

              • C:\PROGRA~1\FREERA~1\2.inf

                Filesize

                230B

                MD5

                f6dcb2862f6e7f9e69fb7d18668c59f1

                SHA1

                bb23dbba95d8af94ecc36a7d2dd4888af2856737

                SHA256

                c68fe97c64b68f00b3cc853ae6a6d324b470a558df57eac2593487978592eb2c

                SHA512

                eefe630b776d2144df39e9c385824374b3d546e30293d7efe10cc2d6bf6f2c932162bf80add1c8ca58afcc868ad02b3ffc104c0f111f3827f4385ee9f26f5e75

              • C:\PROGRA~1\FREERA~1\4.bat

                Filesize

                5.8MB

                MD5

                816ed20570041eee5295f5d19f2e9d01

                SHA1

                72f883ecb275e124301fda12b92f15423f1b8576

                SHA256

                4ab8dbb9b33642dd663ccaf7d95e281fdf5fc8c48ccea3a3793dcf7f81f7ce37

                SHA512

                545d5ca03bdf5317deb48c5b375951333a7d77678259c19f3c8aabda6796b6dded11474127c4454ea3892f89df569731e400e64ebca5c43a69498e6a8155361a

              • C:\Program Files\FreeRapid\1.bin

                Filesize

                57.2MB

                MD5

                987cb96ad4ce1361a1c3ea51af40e1bf

                SHA1

                3af65378c6025413acfdbd9032f4e5230151bfc5

                SHA256

                a79edfd0acfccca779c7ff19b30eb13f51fbdbbd2d739d9e73d5c56296e6ef6d

                SHA512

                0e995c79f725f89b020e775db612b249fff0c98d32a58e37193e940d48c78a90a0cbacd3083e05f07a0488bf04af0fac84eb754461fcb3ba154b2eb101b18889

              • C:\Program Files\FreeRapid\loader.tmp

                Filesize

                57.3MB

                MD5

                c91abb8bbd2c13e5f08a1ab03ad91ac8

                SHA1

                46b1f0f58cdf90aa5f2bd546d33ee95c8d43e215

                SHA256

                4c504af191c883a082b6fd0691f37e5661c74985bc1f6822011dfcbe58775f28

                SHA512

                fa54658182b0331eaefa04cb952eb1583931a951406299bffbadbe85f651791ab6265774c7aa37bb6005b2de428109b9aa0cbbbb955db84843857fa7f041f609

              • C:\Program Files\FreeRapid\loader.tmp

                Filesize

                57.3MB

                MD5

                c91abb8bbd2c13e5f08a1ab03ad91ac8

                SHA1

                46b1f0f58cdf90aa5f2bd546d33ee95c8d43e215

                SHA256

                4c504af191c883a082b6fd0691f37e5661c74985bc1f6822011dfcbe58775f28

                SHA512

                fa54658182b0331eaefa04cb952eb1583931a951406299bffbadbe85f651791ab6265774c7aa37bb6005b2de428109b9aa0cbbbb955db84843857fa7f041f609

              • C:\Progra~1\FreeRapid\1.bin

                Filesize

                57.2MB

                MD5

                987cb96ad4ce1361a1c3ea51af40e1bf

                SHA1

                3af65378c6025413acfdbd9032f4e5230151bfc5

                SHA256

                a79edfd0acfccca779c7ff19b30eb13f51fbdbbd2d739d9e73d5c56296e6ef6d

                SHA512

                0e995c79f725f89b020e775db612b249fff0c98d32a58e37193e940d48c78a90a0cbacd3083e05f07a0488bf04af0fac84eb754461fcb3ba154b2eb101b18889

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                471B

                MD5

                1520b1f0e8660cc8553264ce46871efd

                SHA1

                70c43f2c0b7599f782461590f8e1650a2df5dbfe

                SHA256

                8bb8dd5446da57093db31c10b4093a2378a9324f137d3eaa21ab0027e191c09e

                SHA512

                6ad8d5f620738988286981654070c9a4e2542f629f4e5245381143a2a88c98922145759ff8d90546e1a617639a7dd335ddca4aba5435fb216c01c705bc4f0be0

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                404B

                MD5

                990a4f34541ed6f6c28fa8ed65871c27

                SHA1

                6acbac43de512a37ea8da42a6cc0aa91e58b9ed2

                SHA256

                c5919a20effc093e2a5547f522f6d4e1fbe5ae7325080c4a0279657389a4867b

                SHA512

                a5584a6dfd63816b87b1a49ac90902ec42bc9722578d71dce51b0b036ee2acfa41959835328064ccda23202c76f26fdc810c18e6ebdfc67886fffc397e8ad3db

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat

                Filesize

                1KB

                MD5

                6d1243122894ef0bed1052c81c0cd3d4

                SHA1

                bb991babac902517b641acdc984c53b5cafb8cf0

                SHA256

                6179e36d8e291850bb181ff20f7eeede05d4847c8f77d2d75f98fe8ef5709d42

                SHA512

                b2ecee33230a2613b1b61a85ebd784199b542388b99181065278184830a257950e98be8dae9807ccd27ddc48479c50112acd9c18c723575b89b1bdcb17d8d038

              • C:\Users\Admin\AppData\Local\Temp\afc9fe2f418b00a0.bat

                Filesize

                2KB

                MD5

                be9c2a6c4473d5ff3130700864019244

                SHA1

                bd964f122e7715e3fce78dcbbc2118cc85f42053

                SHA256

                8f07137e93b92f7942caa3cca96b3c66d390aa8aaf9bc112d3b132948c61c5bd

                SHA512

                b4810796fad38757315c6d21b03f7cc13777fc928d32f0222208f460f7a515d626837d460dbcd2c0959f1ba383f60a395724325cd7a8d0b8c53538a0a4b16cbc

              • C:\Users\Admin\AppData\Local\Temp\inl2AEA.tmp

                Filesize

                57.2MB

                MD5

                bda5044e31a7eb5907fc4da507d1eb5d

                SHA1

                2831e9d0de5771eb05989ca289f626feaceee0c9

                SHA256

                fe359fdf3518ee00f2bdc8e6f4641a0b9fc99fbb6ad11debac34af850c021880

                SHA512

                8dbaedec5d8fe4d4ee04fee142cfa64a864ddcb420c4c388af50c65017c7b4110576a46886433266d018bd5657d75e9121f12720e46e35d98065f023de1c2244

              • C:\Users\Admin\AppData\Local\Temp\inl2AEA.tmp

                Filesize

                57.2MB

                MD5

                bda5044e31a7eb5907fc4da507d1eb5d

                SHA1

                2831e9d0de5771eb05989ca289f626feaceee0c9

                SHA256

                fe359fdf3518ee00f2bdc8e6f4641a0b9fc99fbb6ad11debac34af850c021880

                SHA512

                8dbaedec5d8fe4d4ee04fee142cfa64a864ddcb420c4c388af50c65017c7b4110576a46886433266d018bd5657d75e9121f12720e46e35d98065f023de1c2244

              • C:\Users\Admin\AppData\Local\Temp\socketmouse1.bat

                Filesize

                36B

                MD5

                0b53221b1332efb76ebd2ab7120ff78f

                SHA1

                e3dda4d21e35819eaf50e50c2aab2950ff1505b5

                SHA256

                05bbda79058985c35a48637dcbc66c73176e1f7e4c95e8aef8b762066b780388

                SHA512

                877637688f255d94b94feb3b2444678836db41644f6e1a7d1f902c8c12bab45785393a8f210215eebcdcb3526002632863bf54f026047aa1edee8481b26dddcd

              • C:\Users\Admin\AppData\Local\Temp\winrar_config.tmp

                Filesize

                631B

                MD5

                0b92bb1f3b9141d221dfedfcc5a59527

                SHA1

                8d0a11d39776442b53436490284dc460137d3e7a

                SHA256

                5ad1f9cc4cff9a7d07bf72edc9ce2ccb0e75a6bb8038ab92a27a54914d560a99

                SHA512

                e3472c917c7ac2657f4ceb3bf8d1cdabca72bc0090ce2d33b3c334d86ad4cb8b68e109d936f6d99b38dd8d44bcd2e2e152d3292c10c77461e79bb13b2db04205

              • memory/2600-166-0x0000000000790000-0x0000000000799000-memory.dmp

                Filesize

                36KB

              • memory/4112-217-0x0000000074180000-0x000000007418A000-memory.dmp

                Filesize

                40KB

              • memory/4312-196-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-218-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-150-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-147-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-165-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-174-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-154-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-159-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-181-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-183-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-186-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-158-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-232-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-231-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-177-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-190-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-175-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-191-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-192-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-193-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-153-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-168-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-226-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-225-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-173-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-172-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-146-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-201-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-202-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-203-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-208-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-207-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-209-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-169-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-211-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-212-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-171-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-163-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-220-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-221-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-219-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-222-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4312-223-0x00007FFE81B10000-0x00007FFE81B7E000-memory.dmp

                Filesize

                440KB

              • memory/4600-164-0x0000000000880000-0x00000000008BC000-memory.dmp

                Filesize

                240KB

              • memory/4600-132-0x0000000000880000-0x00000000008BC000-memory.dmp

                Filesize

                240KB

              • memory/4600-133-0x00000000008D0000-0x00000000008D3000-memory.dmp

                Filesize

                12KB