Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2022 04:52

General

  • Target

    4b5de56e33e310e79076fc2a4fe182bc30284608d8029285b09d0b12b7eb2e98.exe

  • Size

    252KB

  • MD5

    427e35a6495f37a96d047f1c4ae1ac86

  • SHA1

    d1f983fc45f1d51216a61ee8a3c23e1c1fd1c7d5

  • SHA256

    4b5de56e33e310e79076fc2a4fe182bc30284608d8029285b09d0b12b7eb2e98

  • SHA512

    11ec58af55a6741d0cfcba5554ecc21cd1c2afbed06a1bd55aa4af631bd201c16755f52048819194e00022dc9d3b7c58327f46abaa5cce2b88c3338a457caf1a

  • SSDEEP

    3072:KCtFBrDkiap75+blxPCMwy6K9MHecBQ41pBys8:KCtFtDg9sSS0HeQ8

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Executes dropped EXE 2 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b5de56e33e310e79076fc2a4fe182bc30284608d8029285b09d0b12b7eb2e98.exe
    "C:\Users\Admin\AppData\Local\Temp\4b5de56e33e310e79076fc2a4fe182bc30284608d8029285b09d0b12b7eb2e98.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Users\Admin\AppData\Roaming\simc.tmp
      C:\Users\Admin\AppData\Roaming\simc.tmp
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3460
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c afc9fe2f418b00a0.bat
        3⤵
          PID:3184
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FMAMzwbd12.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4224
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\1.bat
          3⤵
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:2228
          • C:\PROGRA~1\INTERN~1\iexplore.exe
            C:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?82133
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:868
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:868 CREDAT:17410 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3044
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\1.inf
            4⤵
              PID:2844
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\2.bat
              4⤵
              • Drops file in Program Files directory
              • Suspicious use of WriteProcessMemory
              PID:3372
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?r"" /f
                5⤵
                • Modifies Internet Explorer settings
                • Modifies Internet Explorer start page
                PID:4844
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?r"" /f
                5⤵
                • Modifies Internet Explorer settings
                • Modifies Internet Explorer start page
                PID:3884
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?r"" /f
                5⤵
                  PID:4752
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f
                  5⤵
                  • Modifies registry class
                  PID:3724
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\PROGRA~1\FREERA~1\3.bat""" /f
                  5⤵
                  • Modifies registry class
                  PID:1864
                • C:\Windows\SysWOW64\attrib.exe
                  attrib +s +h C:\PROGRA~1\FREERA~1\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}
                  5⤵
                  • Sets file to hidden
                  • Drops file in Program Files directory
                  • Views/modifies file attributes
                  PID:4620
                • C:\Windows\SysWOW64\attrib.exe
                  attrib +s +h C:\PROGRA~1\FREERA~1\tmp
                  5⤵
                  • Sets file to hidden
                  • Drops file in Program Files directory
                  • Views/modifies file attributes
                  PID:4380
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\2.inf
                  5⤵
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:1496
                  • C:\Windows\SysWOW64\runonce.exe
                    "C:\Windows\system32\runonce.exe" -r
                    6⤵
                    • Checks processor information in registry
                    • Suspicious use of WriteProcessMemory
                    PID:1596
                    • C:\Windows\SysWOW64\grpconv.exe
                      "C:\Windows\System32\grpconv.exe" -o
                      7⤵
                        PID:2544
              • C:\Users\Admin\AppData\Roaming\smap.tmp
                C:\Users\Admin\AppData\Roaming\smap.tmp
                3⤵
                • Executes dropped EXE
                • Checks computer location settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3912
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Roaming\smap.tmp > nul
                  4⤵
                    PID:3924
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32.exe C:\PROGRA~1\FreeRapid\resv.bin,MainLoad
                  3⤵
                  • Loads dropped DLL
                  • Drops file in Program Files directory
                  PID:4620
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\4B5DE5~1.EXE > nul
                2⤵
                  PID:3172

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\PROGRA~1\FREERA~1\1.bat

                Filesize

                3KB

                MD5

                2b99b7f66b8ebba3071330bcbaccc022

                SHA1

                1a79cdcdd4dd3c9e22b45acdbc20a51da5f23e52

                SHA256

                3ed44f8ec4dd76cadb989353a1ed4a578d93fbba2eb0997443000384e2fb7f09

                SHA512

                03671ec8fbe45df652bddf47141fd017cfd86b25c034608be23eb82035b3e7504765d4fdc9c42e1bbb3de4b132476a5e7156d83fe1982be283c9ea51e9cc8671

              • C:\PROGRA~1\FREERA~1\1.inf

                Filesize

                492B

                MD5

                34c14b8530e1094e792527f7a474fe77

                SHA1

                f71c4e9091140256b34c18220d1dd1efab1f301d

                SHA256

                fe0dfb3458bfe2a3632d365e00765fa10f14d62e7dfa8b70a055c7eb9fdb6713

                SHA512

                25bb09b526e1e9f5c6052f1f7c36b37c956c1b5649936af8df3abfcf120c931f3d2603e17a061cb99d8c8074bfb1973a5423cce89762fca53cd46aeb3e8944a2

              • C:\PROGRA~1\FREERA~1\2.bat

                Filesize

                3KB

                MD5

                66255a9ad2f8d7deaa5577ca57942871

                SHA1

                8003fcd6cf3edd5b053b2765c7178ae90832f370

                SHA256

                553e76f0372969152c699aa8f02d0610114492cf1a0386cd425a6b6e861aa197

                SHA512

                895951abacd29c28e2970096db9e694626952791f4ff84a77c4f584baae80eb9ef7206fa501d671c6983c9c08cce9016a6a572b65d79fc9f5da39cea9e2d4a04

              • C:\PROGRA~1\FREERA~1\2.inf

                Filesize

                230B

                MD5

                f6dcb2862f6e7f9e69fb7d18668c59f1

                SHA1

                bb23dbba95d8af94ecc36a7d2dd4888af2856737

                SHA256

                c68fe97c64b68f00b3cc853ae6a6d324b470a558df57eac2593487978592eb2c

                SHA512

                eefe630b776d2144df39e9c385824374b3d546e30293d7efe10cc2d6bf6f2c932162bf80add1c8ca58afcc868ad02b3ffc104c0f111f3827f4385ee9f26f5e75

              • C:\PROGRA~1\FREERA~1\4.bat

                Filesize

                5.8MB

                MD5

                800e493a52d3f555b60e3bcde5fb9af8

                SHA1

                dd22f095b9f2aaf71cebc5c8204ea3afdfab94b5

                SHA256

                7b164d0ac59a56733d0bd57f2acfb1bff9d59f5f774368cfe61c7317d2294b07

                SHA512

                14d6fd9656865b22187a90df9bee0ca631a0095c9182585119612315523540e1e622976c58e3e150346eb8a258d5bc601ce6beeade5c9fe86862ec6b6c22bfb4

              • C:\PROGRA~1\FreeRapid\resv.bin

                Filesize

                57.2MB

                MD5

                1328f522ecc99f7323cbe1c39299b04c

                SHA1

                0b75ee848b5f4be17195d4eea1632761ee658c2d

                SHA256

                08be591ac993f909630f58f64ec5e770f18ce6c80f0907865ee22c17f1925147

                SHA512

                87635f343523810f0d2aea60b546e5ae52bd52c610aafc69c882ba02c153008df517e0f08ffb42235f340d60a7f33fa7df7a727eb6ec789b1ff9dc52ffd60b6e

              • C:\Program Files\FreeRapid\resv.bin

                Filesize

                57.2MB

                MD5

                1328f522ecc99f7323cbe1c39299b04c

                SHA1

                0b75ee848b5f4be17195d4eea1632761ee658c2d

                SHA256

                08be591ac993f909630f58f64ec5e770f18ce6c80f0907865ee22c17f1925147

                SHA512

                87635f343523810f0d2aea60b546e5ae52bd52c610aafc69c882ba02c153008df517e0f08ffb42235f340d60a7f33fa7df7a727eb6ec789b1ff9dc52ffd60b6e

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                471B

                MD5

                7550b85aee4221c59808672005ed8855

                SHA1

                aeb269eff06f518132b9ecea824523fa125ba2d2

                SHA256

                2b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2

                SHA512

                216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                434B

                MD5

                b99764b80e900e94b1c38b28a774d7d9

                SHA1

                10e05dbdcbe84e25d1895c8304e2468175836ddb

                SHA256

                d709c99109a330d25fe1ba1836d2b2f374eb810b0074d257c8b9c16863bf65ba

                SHA512

                fc81c2b0647a91bbd0a63c9f943ac6c754dc3eda626c5e73470ba732ed1b8076ee94130df59f81e78b5c96127a727417a9daa53f0a9189e9c848de42c1f3154f

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

                Filesize

                1KB

                MD5

                a64fee0477cc773240b551c985cc5ce3

                SHA1

                39ef29eab6548b33fdc3d96367344ed94865319b

                SHA256

                fa0f2de7745b1038af9997f4ba04743ddbe3022dbb432eb03a6418deeb66f61d

                SHA512

                003aa5de9c1580ffb3419e2bbdda98ee4c45b849848eb3224205b0db0d61747ec6f417c242a930cefd1991817c017ca327ef7190438e0af2a0d18956067eed87

              • C:\Users\Admin\AppData\Local\Temp\FMAMzwbd12.bat

                Filesize

                150B

                MD5

                a46b691be5eee69ff975ca45c311f018

                SHA1

                3b9bed578b7554252eb88f900ce398f25d01910a

                SHA256

                a29ce165a0fbd6c8dfec21c891ac2a4d385ef1f7b29e92ae46b131e6694628f4

                SHA512

                6b8acaa1871b6cb8d68bbabc48146b56f267abb329b9ac2357ac70911fd15bd668ff49260e12d54812fd4f066eed67e311414828ddbc3b9068b8b998edb9c08e

              • C:\Users\Admin\AppData\Local\Temp\afc9fe2f418b00a0.bat

                Filesize

                2KB

                MD5

                3d15f5598c7304d4620c459d16b672d6

                SHA1

                d5fd318f2347ef63c062aef5658c5ad5934107c6

                SHA256

                30d8d0e43a0eece7b003fbeb6077a07e910afe03199d3d0022fae0d4be94b7f6

                SHA512

                09c2b357d31851c209d078e3787407555710b2b837ad94f11f9d113259a7f8bdda199c2cea45ab6338d1a8e4ec94f0cb663f13260c4e47383886cb897e9b9a10

              • C:\Users\Admin\AppData\Local\Temp\winrar_config.tmp

                Filesize

                691B

                MD5

                97f94bb975876582715e95f7751546bb

                SHA1

                e1b07092d2454c2d95d8aa76bb44feedae59ce3e

                SHA256

                1b6df88776e4b304fe01c9f495e16fb7116a5eacea2579ea07146a6e2324f7c1

                SHA512

                7d1823c36abab4723094255fd98bfac8d9797f2e5d1c56930927e872ccb0f175c9046d63aaccb8ef3ebcd79adccb779c095e95cd277b383bf8c4f4ac4f2782f5

              • C:\Users\Admin\AppData\Roaming\simc.tmp

                Filesize

                89KB

                MD5

                f8514f3db861a162c678e44e66f0be68

                SHA1

                84d1011909e5d465ac3c287be37089bb18468bc0

                SHA256

                8a843a53be0d7c60a1fdaac0ad0aa73cfb8172e927e8aa5f3556cdbac0e1a1ac

                SHA512

                1b5cf852d5860b5728796224c4392ef2f74184b1b090792bfd21da10c7f761fdffd3c9e92924b1ef76be9921ba689f2c7966f0890713964240bb256710131a7f

              • C:\Users\Admin\AppData\Roaming\simc.tmp

                Filesize

                89KB

                MD5

                f8514f3db861a162c678e44e66f0be68

                SHA1

                84d1011909e5d465ac3c287be37089bb18468bc0

                SHA256

                8a843a53be0d7c60a1fdaac0ad0aa73cfb8172e927e8aa5f3556cdbac0e1a1ac

                SHA512

                1b5cf852d5860b5728796224c4392ef2f74184b1b090792bfd21da10c7f761fdffd3c9e92924b1ef76be9921ba689f2c7966f0890713964240bb256710131a7f

              • C:\Users\Admin\AppData\Roaming\smap.tmp

                Filesize

                57.2MB

                MD5

                af61bf2a4c371a97c46b2f98bbeef041

                SHA1

                18876bf173ab66467570ed13c8b97efd9aa0c535

                SHA256

                97d4ce119efc72c9a74a874eb5b5d6dfda81fe85eee405280ef78537ae518fb1

                SHA512

                8f5bc69653bfaf9888cec51a15ff053f987c5718a0e15f10fc21ce4e450b62f3886a2326973c2527699bb1d7b9a37f502970eddc16ef2df970c314ddd864ce7e

              • C:\Users\Admin\AppData\Roaming\smap.tmp

                Filesize

                57.2MB

                MD5

                af61bf2a4c371a97c46b2f98bbeef041

                SHA1

                18876bf173ab66467570ed13c8b97efd9aa0c535

                SHA256

                97d4ce119efc72c9a74a874eb5b5d6dfda81fe85eee405280ef78537ae518fb1

                SHA512

                8f5bc69653bfaf9888cec51a15ff053f987c5718a0e15f10fc21ce4e450b62f3886a2326973c2527699bb1d7b9a37f502970eddc16ef2df970c314ddd864ce7e

              • memory/868-205-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-190-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-227-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-151-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-156-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-226-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-154-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-157-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-158-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-159-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-160-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-161-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-162-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-165-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-221-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-166-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-168-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-169-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-220-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-171-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-218-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-174-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-175-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-177-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-217-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-178-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-216-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-215-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-183-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-186-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-188-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-187-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-214-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-150-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-191-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-213-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-194-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-195-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-208-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-207-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-204-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-198-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/868-203-0x00007FFC489B0000-0x00007FFC48A1E000-memory.dmp

                Filesize

                440KB

              • memory/1776-132-0x0000000000400000-0x000000000043F000-memory.dmp

                Filesize

                252KB

              • memory/1776-140-0x0000000000400000-0x000000000043F000-memory.dmp

                Filesize

                252KB

              • memory/3912-155-0x00000000000B0000-0x00000000000B9000-memory.dmp

                Filesize

                36KB

              • memory/4620-248-0x0000000075A80000-0x0000000075A8A000-memory.dmp

                Filesize

                40KB