Analysis

  • max time kernel
    657s
  • max time network
    659s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-09-2022 16:55

General

  • Target

    https://www.upload.ee/files/14365900/Oski_Stealer.rar.html

Malware Config

Extracted

Family

oski

C2

62.77.159.212

panel.com

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.upload.ee/files/14365900/Oski_Stealer.rar.html
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.upload.ee/files/14365900/Oski_Stealer.rar.html
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4896
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4896.0.1079189740\1081613230" -parentBuildID 20200403170909 -prefsHandle 1544 -prefMapHandle 1536 -prefsLen 1 -prefMapSize 220115 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4896 "\\.\pipe\gecko-crash-server-pipe.4896" 1624 gpu
        3⤵
          PID:2260
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4896.3.670438034\600102658" -childID 1 -isForBrowser -prefsHandle 2168 -prefMapHandle 2164 -prefsLen 156 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4896 "\\.\pipe\gecko-crash-server-pipe.4896" 2180 tab
          3⤵
            PID:4240
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4896.13.1128796080\1768239644" -childID 2 -isForBrowser -prefsHandle 3268 -prefMapHandle 3264 -prefsLen 6938 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4896 "\\.\pipe\gecko-crash-server-pipe.4896" 3280 tab
            3⤵
              PID:3760
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:2016
          • C:\Program Files\7-Zip\7zG.exe
            "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Oski_Stealer\" -spe -an -ai#7zMap25888:86:7zEvent30972
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:3768
          • C:\Users\Admin\Downloads\Oski_Stealer\Oski_Stealer.exe
            "C:\Users\Admin\Downloads\Oski_Stealer\Oski_Stealer.exe"
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3340
          • C:\Users\Admin\Downloads\Oski_Stealer\Oski_Stealer.exe
            "C:\Users\Admin\Downloads\Oski_Stealer\Oski_Stealer.exe"
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1108
            • C:\Users\Admin\Downloads\Oski_Stealer\crack.exe
              "C:\Users\Admin\Downloads\Oski_Stealer\crack.exe"
              2⤵
              • Executes dropped EXE
              • Drops startup file
              • Suspicious behavior: AddClipboardFormatListener
              PID:508
          • C:\Users\Admin\Downloads\Oski_Stealer\Oski Cracked.exe
            "C:\Users\Admin\Downloads\Oski_Stealer\Oski Cracked.exe"
            1⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Drops file in Windows directory
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:3608
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
            1⤵
            • Drops file in Windows directory
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2356
          • C:\Windows\system32\browser_broker.exe
            C:\Windows\system32\browser_broker.exe -Embedding
            1⤵
            • Modifies Internet Explorer settings
            PID:568
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:3816
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
            • Drops file in Windows directory
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            PID:1876
          • C:\Users\Admin\Downloads\Oski_Stealer\Oski_Cracked_panel.com.exe
            "C:\Users\Admin\Downloads\Oski_Stealer\Oski_Cracked_panel.com.exe"
            1⤵
            • Executes dropped EXE
            PID:4888
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 1212
              2⤵
              • Program crash
              PID:32
          • C:\Users\Admin\Downloads\Oski_Stealer\Oski_Cracked_panel.com.exe
            "C:\Users\Admin\Downloads\Oski_Stealer\Oski_Cracked_panel.com.exe"
            1⤵
            • Executes dropped EXE
            PID:4944
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 1188
              2⤵
              • Program crash
              PID:3104

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Defense Evasion

          Modify Registry

          1
          T1112

          Credential Access

          Credentials in Files

          1
          T1081

          Discovery

          Query Registry

          2
          T1012

          System Information Discovery

          3
          T1082

          Collection

          Data from Local System

          1
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\freebl3.dll
            Filesize

            146B

            MD5

            8eec510e57f5f732fd2cce73df7b73ef

            SHA1

            3c0af39ecb3753c5fee3b53d063c7286019eac3b

            SHA256

            55f7d9e99b8e2d4e0e193b2f0275501e6d9c1ebd29cadbea6a0da48a8587e3e0

            SHA512

            73bbf698482132b5fd60a0b58926fddec9055f8095a53bc52714e211e9340c3419736ceafd6b279667810114d306bfccdcfcddf51c0b67fe9e3c73c54583e574

          • C:\ProgramData\mozglue.dll
            Filesize

            146B

            MD5

            8eec510e57f5f732fd2cce73df7b73ef

            SHA1

            3c0af39ecb3753c5fee3b53d063c7286019eac3b

            SHA256

            55f7d9e99b8e2d4e0e193b2f0275501e6d9c1ebd29cadbea6a0da48a8587e3e0

            SHA512

            73bbf698482132b5fd60a0b58926fddec9055f8095a53bc52714e211e9340c3419736ceafd6b279667810114d306bfccdcfcddf51c0b67fe9e3c73c54583e574

          • C:\ProgramData\msvcp140.dll
            Filesize

            146B

            MD5

            8eec510e57f5f732fd2cce73df7b73ef

            SHA1

            3c0af39ecb3753c5fee3b53d063c7286019eac3b

            SHA256

            55f7d9e99b8e2d4e0e193b2f0275501e6d9c1ebd29cadbea6a0da48a8587e3e0

            SHA512

            73bbf698482132b5fd60a0b58926fddec9055f8095a53bc52714e211e9340c3419736ceafd6b279667810114d306bfccdcfcddf51c0b67fe9e3c73c54583e574

          • C:\ProgramData\nss3.dll
            Filesize

            146B

            MD5

            8eec510e57f5f732fd2cce73df7b73ef

            SHA1

            3c0af39ecb3753c5fee3b53d063c7286019eac3b

            SHA256

            55f7d9e99b8e2d4e0e193b2f0275501e6d9c1ebd29cadbea6a0da48a8587e3e0

            SHA512

            73bbf698482132b5fd60a0b58926fddec9055f8095a53bc52714e211e9340c3419736ceafd6b279667810114d306bfccdcfcddf51c0b67fe9e3c73c54583e574

          • C:\ProgramData\softokn3.dll
            Filesize

            146B

            MD5

            8eec510e57f5f732fd2cce73df7b73ef

            SHA1

            3c0af39ecb3753c5fee3b53d063c7286019eac3b

            SHA256

            55f7d9e99b8e2d4e0e193b2f0275501e6d9c1ebd29cadbea6a0da48a8587e3e0

            SHA512

            73bbf698482132b5fd60a0b58926fddec9055f8095a53bc52714e211e9340c3419736ceafd6b279667810114d306bfccdcfcddf51c0b67fe9e3c73c54583e574

          • C:\ProgramData\sqlite3.dll
            Filesize

            146B

            MD5

            8eec510e57f5f732fd2cce73df7b73ef

            SHA1

            3c0af39ecb3753c5fee3b53d063c7286019eac3b

            SHA256

            55f7d9e99b8e2d4e0e193b2f0275501e6d9c1ebd29cadbea6a0da48a8587e3e0

            SHA512

            73bbf698482132b5fd60a0b58926fddec9055f8095a53bc52714e211e9340c3419736ceafd6b279667810114d306bfccdcfcddf51c0b67fe9e3c73c54583e574

          • C:\ProgramData\vcruntime140.dll
            Filesize

            146B

            MD5

            8eec510e57f5f732fd2cce73df7b73ef

            SHA1

            3c0af39ecb3753c5fee3b53d063c7286019eac3b

            SHA256

            55f7d9e99b8e2d4e0e193b2f0275501e6d9c1ebd29cadbea6a0da48a8587e3e0

            SHA512

            73bbf698482132b5fd60a0b58926fddec9055f8095a53bc52714e211e9340c3419736ceafd6b279667810114d306bfccdcfcddf51c0b67fe9e3c73c54583e574

          • C:\Users\Admin\Downloads\Oski_Stealer.rar
            Filesize

            21.1MB

            MD5

            8b08722c088f4d3cd86f6febe3009218

            SHA1

            6f861205315deeb116e7089bdd6bf9084e5b319a

            SHA256

            5a98eeb8380e97436bd6d1f4a828b2e443e0020df9e8220b28a71e18b0338141

            SHA512

            1188110fe449c68ccd92d206dc19f759fdffe2bbe1f46c43113a23060f84a4a4254b8aa3d0b8afad5a052dfc14df580dd841ef80b850652b82a9feeb4672f08f

          • C:\Users\Admin\Downloads\Oski_Stealer\Oski Cracked.exe
            Filesize

            3.9MB

            MD5

            2bd0e61c45d352697c5e16437d8055b0

            SHA1

            0b9b24d396a50c2dc13d73e1f2d57c1891de3f31

            SHA256

            71efc8fc1dede4f96e837043ad3cbd38a65bd530ce71ae4d44ddc29843fab70b

            SHA512

            80044d4ece73637328e9b456c3127be02ecc9cea4b12fee65a884fed0266187aec58e6906c652face3b6125d59b9fa10303f02e1d8bfa33dbccb62fd2bc2b73d

          • C:\Users\Admin\Downloads\Oski_Stealer\Oski Cracked.exe
            Filesize

            3.9MB

            MD5

            2bd0e61c45d352697c5e16437d8055b0

            SHA1

            0b9b24d396a50c2dc13d73e1f2d57c1891de3f31

            SHA256

            71efc8fc1dede4f96e837043ad3cbd38a65bd530ce71ae4d44ddc29843fab70b

            SHA512

            80044d4ece73637328e9b456c3127be02ecc9cea4b12fee65a884fed0266187aec58e6906c652face3b6125d59b9fa10303f02e1d8bfa33dbccb62fd2bc2b73d

          • C:\Users\Admin\Downloads\Oski_Stealer\Oski_Cracked_panel.com.exe
            Filesize

            200KB

            MD5

            6a24d4e31d46c2f602996981fe525fb6

            SHA1

            4134cbbdfec13e772a5d4b7af79159248781ef04

            SHA256

            b1a5d1029b72e65e2063bbdfff90d6e6c9ce98863859ddfa0c5f38f7afa7b770

            SHA512

            338f1252beb06140b4ac07087b38cfa9cc6b8a116e42c448ba2a489daf5ed039d6715c2e7f2288e71d94e964eae0fae1387a00264251043ec69bb170a62f8cfe

          • C:\Users\Admin\Downloads\Oski_Stealer\Oski_Cracked_panel.com.exe
            Filesize

            200KB

            MD5

            6a24d4e31d46c2f602996981fe525fb6

            SHA1

            4134cbbdfec13e772a5d4b7af79159248781ef04

            SHA256

            b1a5d1029b72e65e2063bbdfff90d6e6c9ce98863859ddfa0c5f38f7afa7b770

            SHA512

            338f1252beb06140b4ac07087b38cfa9cc6b8a116e42c448ba2a489daf5ed039d6715c2e7f2288e71d94e964eae0fae1387a00264251043ec69bb170a62f8cfe

          • C:\Users\Admin\Downloads\Oski_Stealer\Oski_Cracked_panel.com.exe
            Filesize

            200KB

            MD5

            6a24d4e31d46c2f602996981fe525fb6

            SHA1

            4134cbbdfec13e772a5d4b7af79159248781ef04

            SHA256

            b1a5d1029b72e65e2063bbdfff90d6e6c9ce98863859ddfa0c5f38f7afa7b770

            SHA512

            338f1252beb06140b4ac07087b38cfa9cc6b8a116e42c448ba2a489daf5ed039d6715c2e7f2288e71d94e964eae0fae1387a00264251043ec69bb170a62f8cfe

          • C:\Users\Admin\Downloads\Oski_Stealer\Oski_Stealer.exe
            Filesize

            20.8MB

            MD5

            e805420c064b84ae287b068f14ffb2e8

            SHA1

            bbd5cf53618c2cdf47464d6c688d7baa433747c3

            SHA256

            d727c2ed17780b47f2c8661cf896d434d2a1946a30888245dd1d47e7e7fdcbbf

            SHA512

            0881d0023d54581a723f4523be720b42f8417cc9c0ad057fdc235ed90e246643034471300ec4fd6e5cb8d97d33ce136f9edabab5141f4af23fa27ec4dbd61e33

          • C:\Users\Admin\Downloads\Oski_Stealer\Oski_Stealer.exe
            Filesize

            20.8MB

            MD5

            e805420c064b84ae287b068f14ffb2e8

            SHA1

            bbd5cf53618c2cdf47464d6c688d7baa433747c3

            SHA256

            d727c2ed17780b47f2c8661cf896d434d2a1946a30888245dd1d47e7e7fdcbbf

            SHA512

            0881d0023d54581a723f4523be720b42f8417cc9c0ad057fdc235ed90e246643034471300ec4fd6e5cb8d97d33ce136f9edabab5141f4af23fa27ec4dbd61e33

          • C:\Users\Admin\Downloads\Oski_Stealer\Oski_Stealer.exe
            Filesize

            20.8MB

            MD5

            e805420c064b84ae287b068f14ffb2e8

            SHA1

            bbd5cf53618c2cdf47464d6c688d7baa433747c3

            SHA256

            d727c2ed17780b47f2c8661cf896d434d2a1946a30888245dd1d47e7e7fdcbbf

            SHA512

            0881d0023d54581a723f4523be720b42f8417cc9c0ad057fdc235ed90e246643034471300ec4fd6e5cb8d97d33ce136f9edabab5141f4af23fa27ec4dbd61e33

          • C:\Users\Admin\Downloads\Oski_Stealer\bat.exe
            Filesize

            200KB

            MD5

            3ac80dee855e85c52c0170373af79a04

            SHA1

            79b6a5708b05b88847b605dfe5271073826ba5f4

            SHA256

            52338add561f1e396b0f8377e77bae2a05bcb8d7cc19548dbf9ff8cf0b57cc1f

            SHA512

            0a2eae9404bec953ba84d98c05455b0fd42500c80ab66e8c9ffb19e102a81cb98dd09b82e862dbe15fb142e39165514ff6ac12d6acf47494a73222052923eb3c

          • C:\Users\Admin\Downloads\Oski_Stealer\bot.exe
            Filesize

            200KB

            MD5

            3ac80dee855e85c52c0170373af79a04

            SHA1

            79b6a5708b05b88847b605dfe5271073826ba5f4

            SHA256

            52338add561f1e396b0f8377e77bae2a05bcb8d7cc19548dbf9ff8cf0b57cc1f

            SHA512

            0a2eae9404bec953ba84d98c05455b0fd42500c80ab66e8c9ffb19e102a81cb98dd09b82e862dbe15fb142e39165514ff6ac12d6acf47494a73222052923eb3c

          • C:\Users\Admin\Downloads\Oski_Stealer\crack.exe
            Filesize

            18KB

            MD5

            2a62b2d78f2c0f2efd39f07641d231e1

            SHA1

            30e17f27edb951a306fd907e37aacc170bf3c7be

            SHA256

            b4b1dd5fc206b0089ca1e7d613d6475a9a06bbcf4c207830d7c0cf02a94ae79a

            SHA512

            4246bb79753f803aaeef24ec6bb9f5ec23859f2cc24d3cfb58c901722cd089b98cf8a2eae6763d18f1a2a330f71887aa8dfbfbd2bb92865680c2f1135a371ca5

          • C:\Users\Admin\Downloads\Oski_Stealer\crack.exe
            Filesize

            18KB

            MD5

            2a62b2d78f2c0f2efd39f07641d231e1

            SHA1

            30e17f27edb951a306fd907e37aacc170bf3c7be

            SHA256

            b4b1dd5fc206b0089ca1e7d613d6475a9a06bbcf4c207830d7c0cf02a94ae79a

            SHA512

            4246bb79753f803aaeef24ec6bb9f5ec23859f2cc24d3cfb58c901722cd089b98cf8a2eae6763d18f1a2a330f71887aa8dfbfbd2bb92865680c2f1135a371ca5

          • C:\Users\Admin\Downloads\Oski_Stealer\learn all kind of hacking.url
            Filesize

            121B

            MD5

            7ade4a739cbd8f44d0ef52a2f1bc6e7b

            SHA1

            20753d483e1a84cb248ba2c0fb72d44137d7d73f

            SHA256

            cc7649ed53c65e4851ace414529564fe16801bb2bed4cb15588bfd6b4ac13616

            SHA512

            5850c3d064c9d616854a47b4bd398b76494f1fbe9b356ec5e15879f97dc67970168196ec6b177fa71d15d25d25757a29319cbf9697f3a80461aa62b431d53851

          • memory/508-285-0x00000000002C0000-0x00000000002CC000-memory.dmp
            Filesize

            48KB

          • memory/508-282-0x0000000000000000-mapping.dmp
          • memory/1108-141-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/1108-159-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/1108-143-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/1108-146-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/1108-135-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/1108-139-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/1108-137-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/1108-140-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/1108-157-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/1108-152-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/1108-154-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/1108-156-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-176-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-155-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-161-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-163-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-164-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-166-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-167-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-168-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-170-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-142-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-172-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-173-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-175-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-174-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-177-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-179-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-180-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-182-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-183-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-181-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-178-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-144-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-169-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-165-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-162-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-160-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-150-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-158-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-153-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-151-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-145-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-136-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-147-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-138-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-149-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-148-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-133-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-132-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-131-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-118-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-119-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-130-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-129-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-128-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-127-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-126-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-125-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-124-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-123-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-122-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-121-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3340-120-0x0000000077C20000-0x0000000077DAE000-memory.dmp
            Filesize

            1.6MB

          • memory/3608-289-0x000000001B670000-0x000000001BA8C000-memory.dmp
            Filesize

            4.1MB

          • memory/3608-288-0x0000000000650000-0x0000000000A46000-memory.dmp
            Filesize

            4.0MB