Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    22-11-2021 07:55

General

  • Target

    ee408fa74fbfe568a05b0bbeff2e4339.msi

  • Size

    4.0MB

  • MD5

    ee408fa74fbfe568a05b0bbeff2e4339

  • SHA1

    0e8e7da9769102123a1bd8ad0d22e48338d20495

  • SHA256

    abe6b696965b8e856ccb20587f8a2fc8327169557e0083cebeab58e14a9d0560

  • SHA512

    290d475b870da3d3e436d67b6aed192e1f68be592ee2b9eb70b2731596c8ce13be7c0bfd0192d63b57d4d103cca4f5a6d781ccf8dba17234f73c247de21162ac

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Ousaban Banker Checkin M1

    suricata: ET MALWARE Ousaban Banker Checkin M1

  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Script User-Agent 3 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ee408fa74fbfe568a05b0bbeff2e4339.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2700
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F980178973369033E3CED268C2F33AAE
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        "C:\Windows\System32\Wbem\WMIC.exe" process call create 'C:\Users\Admin\UnEoAxEDzWie\IPaDJCXLumdu.exe'
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3152
  • C:\Users\Admin\UnEoAxEDzWie\IPaDJCXLumdu.exe
    C:\Users\Admin\UnEoAxEDzWie\IPaDJCXLumdu.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3384

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\UnEoAxEDzWie\Core.dll
    MD5

    8198bb1b12b41a286c7bbfa51fc45e46

    SHA1

    6c954fea8676904c0999f179bab8067896e9a14a

    SHA256

    d37968ee7da25c83b9417218249d13a3cd177d8f30e012246a0ac4e32a307c77

    SHA512

    a385332fdfa5d032283624cbf2e56f9b3618bac3a6b2cd96a0ce3923ebde8db5e27694d25f6d0ff22c1baa2ad458c12584ca3e067762e021f99479f9e732d703

  • C:\Users\Admin\UnEoAxEDzWie\Host.hst
    MD5

    6aa22d5c684ce5d601147e02968a0cc3

    SHA1

    325bd5b2da137d4d173597601df7dc79ecd23218

    SHA256

    9a2ee7631bb7c23b141fd7fabda5c889cca3739e5afa09640bb512c5aedcb691

    SHA512

    c0961122b8effce53ce5ae85876e7ab6622f934584e5a1ee4ccb6ed47abecb778f253411dd500268bcc1168f0d02120f421eabaeff4b473afe67b8c49c8fbcc3

  • C:\Users\Admin\UnEoAxEDzWie\IPaDJCXLumdu.exe
    MD5

    113badfe1404cd59640cad6b409acb98

    SHA1

    2621f79b2143ae3704e814756e01d326d5145a5a

    SHA256

    35a42f9ea63f72cda8a6c7af60a3fac081154128cba2bf7a7392d85383b6d18a

    SHA512

    f861e831b8311094e32071191585eaceaa512d2bc42096e243a1f94309546614cd788231ce08484039bc70c41824f6c6055b9add233b4793a79f3f399b3cbafb

  • C:\Users\Admin\UnEoAxEDzWie\IPaDJCXLumdu.exe
    MD5

    113badfe1404cd59640cad6b409acb98

    SHA1

    2621f79b2143ae3704e814756e01d326d5145a5a

    SHA256

    35a42f9ea63f72cda8a6c7af60a3fac081154128cba2bf7a7392d85383b6d18a

    SHA512

    f861e831b8311094e32071191585eaceaa512d2bc42096e243a1f94309546614cd788231ce08484039bc70c41824f6c6055b9add233b4793a79f3f399b3cbafb

  • C:\Users\Admin\UnEoAxEDzWie\VoiceRemover.dll
    MD5

    f82d4f0dae5b9fec3a2c9eda117a3e7d

    SHA1

    a85ecba1354fa9fe9c1df86ecd0f6c4f97fb55c5

    SHA256

    81f82b73951aadbf02acc849bf0f262e74c0b274db73a188e2016154f0bff0e5

    SHA512

    d2eb4b2d54666dada213fbd67ef92d980b180fc10f29e044fb1c0ff6adb74d7be412ef20a902a8c8deab5ba6dcf55c846de13cf40cd27f5baefac3663944c0cb

  • C:\Users\Admin\UnEoAxEDzWie\bass.dll
    MD5

    c0b11a7e60f69241ddcb278722ab962f

    SHA1

    ff855961eb5ed8779498915bab3d642044fc9bb1

    SHA256

    a8d979460e970e84eacce36b8a68ae5f6b9cc0fe16e05a6209b4ead52b81b021

    SHA512

    cb040aca6592310bffb72c898b8eb3ca8a46ff2df50212634c637593c58683c8ab62e0188da7aea362e1b063ae5db55cf4bf474295922af0ab94a526465cc472

  • C:\Users\Admin\UnEoAxEDzWie\bass_fx.dll
    MD5

    ea245b00b9d27ef2bd96548a50a9cc2c

    SHA1

    8463fdcdd5ced10c519ee0b406408ae55368e094

    SHA256

    4824a06b819cbe49c485d68a9802d9dae3e3c54d4c2d8b706c8a87b56ceefbf3

    SHA512

    ef1e107571402925ab5b1d9b096d7ceff39c1245a23692a3976164d0de0314f726cca0cb10246fe58a13618fd5629a92025628373b3264153fc1d79b0415d9a7

  • C:\Users\Admin\UnEoAxEDzWie\bassenc.dll
    MD5

    55bb778fba7c0e7680d9536c26faff11

    SHA1

    228b4cc2e25ab11d6d17511d2dcf54481589777c

    SHA256

    71b779210d17cb75342fd229c6355a833927a76a9de3face5b88b3b18c345133

    SHA512

    be4089ceb47469d1d89707eb5ae79fb474a505886bcd83c662ebd6ac9cae92cc03b9689cb937c5df5862e6c3f1e0495e5011d59521a910dd3277527ac424c155

  • C:\Users\Admin\UnEoAxEDzWie\bassmidi.dll
    MD5

    8e8652bc64362b102c15f4e709ebea47

    SHA1

    d2efade45af4d7b0298014a0137cc7429cc8faee

    SHA256

    249e165013b3a1ce0a7bca18e0b17c834e80ebb5af05ab57755cec40500caf31

    SHA512

    e8150d7b5afaf2742816007439f72a3d0c6e3f8eb9bebd976ec1848a914d21cd69db2eb225af1f14c7363085dbffe74261471666e1602e5bb80e5d9ac3c38685

  • C:\Users\Admin\UnEoAxEDzWie\bassmix.dll
    MD5

    2358e10faa66a1c38caf7c3bcecf3386

    SHA1

    17a05b02fbb619a874996c32267fb49a19335eb4

    SHA256

    b0197e1bae8448c4e334e1e8706be354d79b3a700860e9c2589905fb74b8672a

    SHA512

    6801931659430be3996686a7466bb9dc2692499521b6d165cd1002616609833d119d17c30b1ba7fae50e8ca95bda5961115eee4ed47db25e0e69f423562f2eeb

  • C:\Users\Admin\UnEoAxEDzWie\win_sparkle_check_update_with_ui_and_install
    MD5

    b95c5eed2835fa444f615050a35e3181

    SHA1

    b5aadcb8f3da6a3157993d6d9f64f8baf656d830

    SHA256

    2ba62d11ba9bd4d4f4dbcad84aba5fbf3bb693970c44d1f5789d13cc0a1084d3

    SHA512

    4b003ad8a93e1d8399f5e4a39b61c3830bef19a7c416ed68c99ac29b7bb0298943ca471c95ab81070aa2858bfba9b5427f098ecb7693b03697f51f28c3701c43

  • C:\Windows\Installer\MSI372F.tmp
    MD5

    0872fc86ddb1c0c51beab1deaaa80218

    SHA1

    abe143cfe0053d6e93c042815f020ff4714794bc

    SHA256

    99f2f155dfed73c33416e82ca6cd8f6dc66abbf50513a5e2a857d12e49504c60

    SHA512

    1b15ea0122d5adef9098381a2dc9659257ba13704fc4b51105c535044c94e370b9ea24e70c836e85cd0b4c9cc4dab63522c74af2ab913619984e86c27888a346

  • C:\Windows\Installer\MSIC8FE.tmp
    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • C:\Windows\Installer\MSID0DE.tmp
    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • C:\Windows\Installer\MSID13D.tmp
    MD5

    0872fc86ddb1c0c51beab1deaaa80218

    SHA1

    abe143cfe0053d6e93c042815f020ff4714794bc

    SHA256

    99f2f155dfed73c33416e82ca6cd8f6dc66abbf50513a5e2a857d12e49504c60

    SHA512

    1b15ea0122d5adef9098381a2dc9659257ba13704fc4b51105c535044c94e370b9ea24e70c836e85cd0b4c9cc4dab63522c74af2ab913619984e86c27888a346

  • \Users\Admin\UnEoAxEDzWie\Core.dll
    MD5

    8198bb1b12b41a286c7bbfa51fc45e46

    SHA1

    6c954fea8676904c0999f179bab8067896e9a14a

    SHA256

    d37968ee7da25c83b9417218249d13a3cd177d8f30e012246a0ac4e32a307c77

    SHA512

    a385332fdfa5d032283624cbf2e56f9b3618bac3a6b2cd96a0ce3923ebde8db5e27694d25f6d0ff22c1baa2ad458c12584ca3e067762e021f99479f9e732d703

  • \Users\Admin\UnEoAxEDzWie\VoiceRemover.dll
    MD5

    f82d4f0dae5b9fec3a2c9eda117a3e7d

    SHA1

    a85ecba1354fa9fe9c1df86ecd0f6c4f97fb55c5

    SHA256

    81f82b73951aadbf02acc849bf0f262e74c0b274db73a188e2016154f0bff0e5

    SHA512

    d2eb4b2d54666dada213fbd67ef92d980b180fc10f29e044fb1c0ff6adb74d7be412ef20a902a8c8deab5ba6dcf55c846de13cf40cd27f5baefac3663944c0cb

  • \Users\Admin\UnEoAxEDzWie\bass.dll
    MD5

    c0b11a7e60f69241ddcb278722ab962f

    SHA1

    ff855961eb5ed8779498915bab3d642044fc9bb1

    SHA256

    a8d979460e970e84eacce36b8a68ae5f6b9cc0fe16e05a6209b4ead52b81b021

    SHA512

    cb040aca6592310bffb72c898b8eb3ca8a46ff2df50212634c637593c58683c8ab62e0188da7aea362e1b063ae5db55cf4bf474295922af0ab94a526465cc472

  • \Users\Admin\UnEoAxEDzWie\bass_fx.dll
    MD5

    ea245b00b9d27ef2bd96548a50a9cc2c

    SHA1

    8463fdcdd5ced10c519ee0b406408ae55368e094

    SHA256

    4824a06b819cbe49c485d68a9802d9dae3e3c54d4c2d8b706c8a87b56ceefbf3

    SHA512

    ef1e107571402925ab5b1d9b096d7ceff39c1245a23692a3976164d0de0314f726cca0cb10246fe58a13618fd5629a92025628373b3264153fc1d79b0415d9a7

  • \Users\Admin\UnEoAxEDzWie\bassenc.dll
    MD5

    55bb778fba7c0e7680d9536c26faff11

    SHA1

    228b4cc2e25ab11d6d17511d2dcf54481589777c

    SHA256

    71b779210d17cb75342fd229c6355a833927a76a9de3face5b88b3b18c345133

    SHA512

    be4089ceb47469d1d89707eb5ae79fb474a505886bcd83c662ebd6ac9cae92cc03b9689cb937c5df5862e6c3f1e0495e5011d59521a910dd3277527ac424c155

  • \Users\Admin\UnEoAxEDzWie\bassmidi.dll
    MD5

    0a5ae35db02684161b4c7f43d4ea6b1d

    SHA1

    3cc1cbf7bd5a2e6039fac768487e1455fbc494b3

    SHA256

    4d773dc64babe2ef4e9391d2ed58cfa19d401b6402b0b2a29c986352deaf9428

    SHA512

    0f9c40809b31e5899409b28295a6d848c63e908d73dcb846771fb55426aa6ad0d37d0261ccaf9d9f8836fa579959bb7243acb14afc290c8831d85586843dc479

  • \Users\Admin\UnEoAxEDzWie\bassmidi.dll
    MD5

    02eb1150b7ca3bb9973e9e71dd67e836

    SHA1

    2f4df971b68f7334d3fadbb177958b24b5395df4

    SHA256

    f40ef317f6180bc6660ca258d79afb321ac5d58cb634aed07bceb468d4335c1d

    SHA512

    3a5cb6dad42397a169117da9ea890048e52a89ac20874e977a283f37e2502f900acbd1914411e8aaa6f857d4ed2b5c3d4c28bb2389b66b2c3326b1c6646c4a9b

  • \Users\Admin\UnEoAxEDzWie\bassmix.dll
    MD5

    2358e10faa66a1c38caf7c3bcecf3386

    SHA1

    17a05b02fbb619a874996c32267fb49a19335eb4

    SHA256

    b0197e1bae8448c4e334e1e8706be354d79b3a700860e9c2589905fb74b8672a

    SHA512

    6801931659430be3996686a7466bb9dc2692499521b6d165cd1002616609833d119d17c30b1ba7fae50e8ca95bda5961115eee4ed47db25e0e69f423562f2eeb

  • \Windows\Installer\MSI372F.tmp
    MD5

    0872fc86ddb1c0c51beab1deaaa80218

    SHA1

    abe143cfe0053d6e93c042815f020ff4714794bc

    SHA256

    99f2f155dfed73c33416e82ca6cd8f6dc66abbf50513a5e2a857d12e49504c60

    SHA512

    1b15ea0122d5adef9098381a2dc9659257ba13704fc4b51105c535044c94e370b9ea24e70c836e85cd0b4c9cc4dab63522c74af2ab913619984e86c27888a346

  • \Windows\Installer\MSIC8FE.tmp
    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • \Windows\Installer\MSID0DE.tmp
    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • \Windows\Installer\MSID13D.tmp
    MD5

    0872fc86ddb1c0c51beab1deaaa80218

    SHA1

    abe143cfe0053d6e93c042815f020ff4714794bc

    SHA256

    99f2f155dfed73c33416e82ca6cd8f6dc66abbf50513a5e2a857d12e49504c60

    SHA512

    1b15ea0122d5adef9098381a2dc9659257ba13704fc4b51105c535044c94e370b9ea24e70c836e85cd0b4c9cc4dab63522c74af2ab913619984e86c27888a346

  • memory/1360-121-0x0000000000050000-0x0000000000051000-memory.dmp
    Filesize

    4KB

  • memory/1360-120-0x0000000000050000-0x0000000000051000-memory.dmp
    Filesize

    4KB

  • memory/1360-119-0x0000000000000000-mapping.dmp
  • memory/2700-115-0x0000027AF60A0000-0x0000027AF60A2000-memory.dmp
    Filesize

    8KB

  • memory/2700-116-0x0000027AF60A0000-0x0000027AF60A2000-memory.dmp
    Filesize

    8KB

  • memory/3152-128-0x0000000000000000-mapping.dmp
  • memory/3384-165-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-183-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-152-0x0000000002870000-0x0000000002871000-memory.dmp
    Filesize

    4KB

  • memory/3384-153-0x0000000000AC0000-0x0000000000AC4000-memory.dmp
    Filesize

    16KB

  • memory/3384-154-0x00000000028A0000-0x00000000028A1000-memory.dmp
    Filesize

    4KB

  • memory/3384-156-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-157-0x00000000028B0000-0x00000000028B1000-memory.dmp
    Filesize

    4KB

  • memory/3384-158-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-161-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-160-0x00000000028C0000-0x00000000028C1000-memory.dmp
    Filesize

    4KB

  • memory/3384-162-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-159-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-155-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-163-0x00000000028D0000-0x00000000028D1000-memory.dmp
    Filesize

    4KB

  • memory/3384-164-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-150-0x0000000071A10000-0x0000000071A1C000-memory.dmp
    Filesize

    48KB

  • memory/3384-167-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-166-0x00000000028E0000-0x00000000028E1000-memory.dmp
    Filesize

    4KB

  • memory/3384-168-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-169-0x0000000003090000-0x0000000003091000-memory.dmp
    Filesize

    4KB

  • memory/3384-170-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-171-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-172-0x00000000030A0000-0x00000000030A1000-memory.dmp
    Filesize

    4KB

  • memory/3384-173-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-174-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-175-0x00000000030B0000-0x00000000030B1000-memory.dmp
    Filesize

    4KB

  • memory/3384-176-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-177-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-178-0x00000000030C0000-0x00000000030C1000-memory.dmp
    Filesize

    4KB

  • memory/3384-179-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-180-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-181-0x00000000030D0000-0x00000000030D1000-memory.dmp
    Filesize

    4KB

  • memory/3384-182-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-151-0x0000000000A80000-0x0000000000AA4000-memory.dmp
    Filesize

    144KB

  • memory/3384-184-0x00000000030E0000-0x00000000030E1000-memory.dmp
    Filesize

    4KB

  • memory/3384-185-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-186-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-188-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-189-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-187-0x00000000030F0000-0x00000000030F1000-memory.dmp
    Filesize

    4KB

  • memory/3384-190-0x0000000003100000-0x0000000003101000-memory.dmp
    Filesize

    4KB

  • memory/3384-192-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-191-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-193-0x0000000003110000-0x0000000003111000-memory.dmp
    Filesize

    4KB

  • memory/3384-194-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-195-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-196-0x0000000003120000-0x0000000003121000-memory.dmp
    Filesize

    4KB

  • memory/3384-197-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-198-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-200-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-199-0x0000000003130000-0x0000000003131000-memory.dmp
    Filesize

    4KB

  • memory/3384-201-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-203-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-204-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-202-0x0000000003140000-0x0000000003141000-memory.dmp
    Filesize

    4KB

  • memory/3384-205-0x0000000003150000-0x0000000003151000-memory.dmp
    Filesize

    4KB

  • memory/3384-206-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-207-0x0000000002A40000-0x0000000002B80000-memory.dmp
    Filesize

    1.2MB

  • memory/3384-208-0x0000000003160000-0x0000000003161000-memory.dmp
    Filesize

    4KB

  • memory/3384-214-0x0000000003170000-0x0000000003171000-memory.dmp
    Filesize

    4KB

  • memory/3384-149-0x0000000071AA0000-0x0000000071AF0000-memory.dmp
    Filesize

    320KB

  • memory/3384-217-0x00000000053F1000-0x000000000582F000-memory.dmp
    Filesize

    4.2MB

  • memory/3384-218-0x0000000004C30000-0x0000000004C31000-memory.dmp
    Filesize

    4KB

  • memory/3384-148-0x0000000000ED0000-0x0000000001017000-memory.dmp
    Filesize

    1.3MB

  • memory/4056-117-0x00000289141D0000-0x00000289141D2000-memory.dmp
    Filesize

    8KB

  • memory/4056-118-0x00000289141D0000-0x00000289141D2000-memory.dmp
    Filesize

    8KB