Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 00:00

General

  • Target

    57e84377d71a6017828eef007574f31838ff487f5318817668c35a36ee5de9a7.exe

  • Size

    74KB

  • MD5

    2bbe0c466cd442c9d414d015a5d92d31

  • SHA1

    a467af9a966d6d000282a4256ff6d17a7b0247df

  • SHA256

    57e84377d71a6017828eef007574f31838ff487f5318817668c35a36ee5de9a7

  • SHA512

    f079732452fa730ac73acba4fe353a7cba1c235b779c469e4859379690627c24b2618f3108036cfc3c616dd7e9cb6e31bf36a7cf4d35741df30e02a8406f66fa

  • SSDEEP

    1536:wUBCVCilCsiPLIF5C7WLoFSurN6b4PFweJHwt3S/Bd9x57N89h0eb:wUBCCil7CaMWLokHMPy3+Nwb

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Executes dropped EXE 2 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57e84377d71a6017828eef007574f31838ff487f5318817668c35a36ee5de9a7.exe
    "C:\Users\Admin\AppData\Local\Temp\57e84377d71a6017828eef007574f31838ff487f5318817668c35a36ee5de9a7.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Program Files\FreeRapid\loader.tmp
      "C:\Program Files\FreeRapid\loader.tmp"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3720
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c afc9fe2f418b00a0.bat
        3⤵
          PID:4868
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\apeflacmp3.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4896
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\1.bat
          3⤵
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:3160
          • C:\PROGRA~1\INTERN~1\iexplore.exe
            C:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?71628
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5112
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5112 CREDAT:17410 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2160
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\1.inf
            4⤵
              PID:4268
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\2.bat
              4⤵
              • Drops file in Program Files directory
              • Suspicious use of WriteProcessMemory
              PID:3480
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.71628.com/?i"" /f
                5⤵
                • Modifies Internet Explorer settings
                • Modifies Internet Explorer start page
                PID:2196
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.71628.com/?i"" /f
                5⤵
                • Modifies Internet Explorer settings
                • Modifies Internet Explorer start page
                PID:3388
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCU\Software\tmp" /v "key" /d ""http://www.71628.com/?i"" /f
                5⤵
                  PID:4392
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\PROGRA~1\FREERA~1\3.bat""" /f
                  5⤵
                  • Modifies registry class
                  PID:3660
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f
                  5⤵
                  • Modifies registry class
                  PID:3632
                • C:\Windows\SysWOW64\attrib.exe
                  attrib +s +h C:\PROGRA~1\FREERA~1\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}
                  5⤵
                  • Sets file to hidden
                  • Drops file in Program Files directory
                  • Views/modifies file attributes
                  PID:3128
                • C:\Windows\SysWOW64\attrib.exe
                  attrib +s +h C:\PROGRA~1\FREERA~1\tmp
                  5⤵
                  • Sets file to hidden
                  • Drops file in Program Files directory
                  • Views/modifies file attributes
                  PID:3004
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\2.inf
                  5⤵
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:4960
                  • C:\Windows\SysWOW64\runonce.exe
                    "C:\Windows\system32\runonce.exe" -r
                    6⤵
                    • Checks processor information in registry
                    • Suspicious use of WriteProcessMemory
                    PID:3676
                    • C:\Windows\SysWOW64\grpconv.exe
                      "C:\Windows\System32\grpconv.exe" -o
                      7⤵
                        PID:3996
                  • C:\Windows\SysWOW64\rundll32.exe
                    rundll32 C:\Progra~1\FreeRapid\1.bin,MainLoad
                    5⤵
                    • Loads dropped DLL
                    • Drops file in Program Files directory
                    PID:4184
            • C:\Users\Admin\AppData\Local\Temp\inl3D88.tmp
              C:\Users\Admin\AppData\Local\Temp\inl3D88.tmp
              2⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:316
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl3D88.tmp > nul
                3⤵
                  PID:4960
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\57E843~1.EXE > nul
                2⤵
                  PID:3816

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\PROGRA~1\FREERA~1\1.bat

                Filesize

                3KB

                MD5

                286fe459674aef6eee17f6ac79a15fdb

                SHA1

                233dc43099c575a67b05fc1076e676324fd6e63d

                SHA256

                872cc596dc1fe6d5a131129bd84c2a76d6874e9c57ab2cd792d4d12b6f014fd2

                SHA512

                c9acc4a134001da76e7ae6aa5ae65ce58501942dfc1f80959ae4db27c06010db753c9d115eedbe0b2b0e30dd5c4dcd1d32816493b053c65cee81d3a343c87314

              • C:\PROGRA~1\FREERA~1\1.inf

                Filesize

                492B

                MD5

                34c14b8530e1094e792527f7a474fe77

                SHA1

                f71c4e9091140256b34c18220d1dd1efab1f301d

                SHA256

                fe0dfb3458bfe2a3632d365e00765fa10f14d62e7dfa8b70a055c7eb9fdb6713

                SHA512

                25bb09b526e1e9f5c6052f1f7c36b37c956c1b5649936af8df3abfcf120c931f3d2603e17a061cb99d8c8074bfb1973a5423cce89762fca53cd46aeb3e8944a2

              • C:\PROGRA~1\FREERA~1\2.bat

                Filesize

                3KB

                MD5

                015b1ad469169c66bd382ba2fde216b8

                SHA1

                7d4114bc649170e4b0ee52cf10b1338fa92022ea

                SHA256

                9f6367a49932b60fff9833ed70e3e0ce5979ede10fb7c3d9a829e83734a11e68

                SHA512

                21c2d56c72ebb54231fc88d6caf7991d85c0c315e2b0975b1eb382f8acb1f5476215a9d3c5aedfbf4d5cb0d7ad860009b5ea8de7ac63e307c3362844483d5216

              • C:\PROGRA~1\FREERA~1\2.inf

                Filesize

                230B

                MD5

                f6dcb2862f6e7f9e69fb7d18668c59f1

                SHA1

                bb23dbba95d8af94ecc36a7d2dd4888af2856737

                SHA256

                c68fe97c64b68f00b3cc853ae6a6d324b470a558df57eac2593487978592eb2c

                SHA512

                eefe630b776d2144df39e9c385824374b3d546e30293d7efe10cc2d6bf6f2c932162bf80add1c8ca58afcc868ad02b3ffc104c0f111f3827f4385ee9f26f5e75

              • C:\PROGRA~1\FREERA~1\4.bat

                Filesize

                5.8MB

                MD5

                8420c2f8369d2f5026014ac68a339d6e

                SHA1

                c2a885d4bb24ff09383cb886cacdee6e4efb4a7e

                SHA256

                42ae256fad2faa05306b52f51b81c67113da913df1f0c0c2823c134ae5a8ba50

                SHA512

                7b3e5548b61fd6c89699aa4b72707035d407c7b7741e83840961d428413fdfd789c0ec0d69453ca6bea0eea8732db055f70a514efd62753d74701768d594e17f

              • C:\Program Files\FreeRapid\1.bin

                Filesize

                57.2MB

                MD5

                831b71a1f339227700eb4a12d3f44f6e

                SHA1

                9121a1143dde1abd2decea0b8faa80f395509700

                SHA256

                58662b79089fc0e4651629601a87bfe5befcc9668d6ea2b1ab55dd5542a351fe

                SHA512

                b5b0214498a382ac62f83ceac5ef10360f0af8cdd2684dedc1de0ebbcb843974f77262f71ef25dadc360e60bce7dca7da0ff6114807d54e0e6b24f4887b3d139

              • C:\Program Files\FreeRapid\loader.tmp

                Filesize

                57.3MB

                MD5

                c35c2ddb936b0ec29177285a19ca9893

                SHA1

                ca1fd707d30cbcfbd35cd0866be8d47bea383b09

                SHA256

                73a6806b39e7a40d6fe3f0813560ba4de1c3ebaf6a2e7b9a41e33bf6837f500c

                SHA512

                9816f158503409c10cb730febe94bab53110c4d7bb78eff90a419adce05afcb618be8e7a4ae67e686faa5fd0e9a1c845ca447129329427ad026542625a35512d

              • C:\Program Files\FreeRapid\loader.tmp

                Filesize

                57.3MB

                MD5

                c35c2ddb936b0ec29177285a19ca9893

                SHA1

                ca1fd707d30cbcfbd35cd0866be8d47bea383b09

                SHA256

                73a6806b39e7a40d6fe3f0813560ba4de1c3ebaf6a2e7b9a41e33bf6837f500c

                SHA512

                9816f158503409c10cb730febe94bab53110c4d7bb78eff90a419adce05afcb618be8e7a4ae67e686faa5fd0e9a1c845ca447129329427ad026542625a35512d

              • C:\Progra~1\FreeRapid\1.bin

                Filesize

                57.2MB

                MD5

                831b71a1f339227700eb4a12d3f44f6e

                SHA1

                9121a1143dde1abd2decea0b8faa80f395509700

                SHA256

                58662b79089fc0e4651629601a87bfe5befcc9668d6ea2b1ab55dd5542a351fe

                SHA512

                b5b0214498a382ac62f83ceac5ef10360f0af8cdd2684dedc1de0ebbcb843974f77262f71ef25dadc360e60bce7dca7da0ff6114807d54e0e6b24f4887b3d139

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                471B

                MD5

                1520b1f0e8660cc8553264ce46871efd

                SHA1

                70c43f2c0b7599f782461590f8e1650a2df5dbfe

                SHA256

                8bb8dd5446da57093db31c10b4093a2378a9324f137d3eaa21ab0027e191c09e

                SHA512

                6ad8d5f620738988286981654070c9a4e2542f629f4e5245381143a2a88c98922145759ff8d90546e1a617639a7dd335ddca4aba5435fb216c01c705bc4f0be0

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                404B

                MD5

                2b5cc6d0029273336d17652d11697ac7

                SHA1

                6a2fe8f8ff14bc28caa1e8ac4dafd2b813423341

                SHA256

                41f18765670f9310c38b97e9b3a97eab23b82a99240f8759191b1941d8572665

                SHA512

                a1b347a2f75a3ca28b518e8700ea8e9eabdec8e5634f21abc34a9b6329b5ca1fcb729b9d18f12e82371be81e97a15d5a9503f25c17987cba751b8b95b2e60562

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

                Filesize

                1KB

                MD5

                cc063501512dc22f1dda29a13d48700b

                SHA1

                35f8d8e4ca55e93633be63e368b931b6469659a4

                SHA256

                a98bfd6f1d39ffa6eca11feea7c72973eebd21a67e50df5337ed99547a2852c0

                SHA512

                d3021558b6eb44c122860d38a2deb9824c69563eb6cd568e125a8cda4de88a167b332118102bfd3ddab0939e88cdbb34b19852dba468a2665f9c72f412af9ce8

              • C:\Users\Admin\AppData\Local\Temp\afc9fe2f418b00a0.bat

                Filesize

                2KB

                MD5

                be9c2a6c4473d5ff3130700864019244

                SHA1

                bd964f122e7715e3fce78dcbbc2118cc85f42053

                SHA256

                8f07137e93b92f7942caa3cca96b3c66d390aa8aaf9bc112d3b132948c61c5bd

                SHA512

                b4810796fad38757315c6d21b03f7cc13777fc928d32f0222208f460f7a515d626837d460dbcd2c0959f1ba383f60a395724325cd7a8d0b8c53538a0a4b16cbc

              • C:\Users\Admin\AppData\Local\Temp\apeflacmp3.bat

                Filesize

                36B

                MD5

                0b53221b1332efb76ebd2ab7120ff78f

                SHA1

                e3dda4d21e35819eaf50e50c2aab2950ff1505b5

                SHA256

                05bbda79058985c35a48637dcbc66c73176e1f7e4c95e8aef8b762066b780388

                SHA512

                877637688f255d94b94feb3b2444678836db41644f6e1a7d1f902c8c12bab45785393a8f210215eebcdcb3526002632863bf54f026047aa1edee8481b26dddcd

              • C:\Users\Admin\AppData\Local\Temp\inl3D88.tmp

                Filesize

                57.2MB

                MD5

                2d1c26ef231bbcdae405443a64036076

                SHA1

                01a2fad36a6242712a30514d9f3e55573332c8c2

                SHA256

                1f38ec2581a410889948d18a948c67b37b3898bab7aa8988896a9664b980cd34

                SHA512

                2e52c07ad3e002037232869e57cc044a19b2f6aa0da32466a31ebc5295687cabc092b4bf7ed783b302a2b17350569c62199d952a6d76eafb1c4403cf55aad2be

              • C:\Users\Admin\AppData\Local\Temp\inl3D88.tmp

                Filesize

                57.2MB

                MD5

                2d1c26ef231bbcdae405443a64036076

                SHA1

                01a2fad36a6242712a30514d9f3e55573332c8c2

                SHA256

                1f38ec2581a410889948d18a948c67b37b3898bab7aa8988896a9664b980cd34

                SHA512

                2e52c07ad3e002037232869e57cc044a19b2f6aa0da32466a31ebc5295687cabc092b4bf7ed783b302a2b17350569c62199d952a6d76eafb1c4403cf55aad2be

              • C:\Users\Admin\AppData\Local\Temp\winrar_config.tmp

                Filesize

                631B

                MD5

                61c9953cd8afc2f1854a4fd292f8bcf1

                SHA1

                333f83d393a6a7d13b6599acd279db737d6489d7

                SHA256

                8f6720bb9fef5bfcc3bf666ea2125e387e963379717623a91f2957a4f5d56023

                SHA512

                ab74e34ad42af142ea67732e02d22b0aca23d84b9b20e3034bb4373695680524812f5fec243f65d8dc3f99359c44e9ddf3748f3ccc73476111422b35832c167a

              • memory/316-192-0x00000000001E0000-0x00000000001E9000-memory.dmp

                Filesize

                36KB

              • memory/4184-213-0x00000000746C0000-0x00000000746CA000-memory.dmp

                Filesize

                40KB

              • memory/4604-132-0x0000000000710000-0x000000000074C000-memory.dmp

                Filesize

                240KB

              • memory/4604-133-0x0000000000620000-0x0000000000623000-memory.dmp

                Filesize

                12KB

              • memory/4604-186-0x0000000000710000-0x000000000074C000-memory.dmp

                Filesize

                240KB

              • memory/5112-197-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-152-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-163-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-160-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-187-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-159-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-190-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-191-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-158-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-188-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-165-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-155-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-156-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-194-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-195-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-154-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-171-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-167-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-202-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-153-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-204-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-182-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-150-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-149-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-146-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-207-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-145-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-211-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-212-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-218-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-219-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-220-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-221-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-222-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-223-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-225-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-226-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-232-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-231-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-178-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-169-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-173-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB

              • memory/5112-170-0x00007FFE1D9C0000-0x00007FFE1DA2E000-memory.dmp

                Filesize

                440KB