Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2023 10:23

General

  • Target

    Purchase Order 202319876.exe

  • Size

    1.7MB

  • MD5

    09338b623f4473341a54191980901783

  • SHA1

    40c8fca01c37d1f1592dacc06f48b918311e37e7

  • SHA256

    f1de1c385fac0c850ee30233c971a76beee78824500899f5c64db03c70ac2e03

  • SHA512

    03da01911a00993ce7ddcd58a3cb6e185389bc341f8b1bde6c287eeca220cf960c690f91d0442b48f812993750d37dc4da4ce86bf6dfc53d00aa9829a31f8fe0

  • SSDEEP

    24576:+b3IBXM8LcvUtY+FGkacy9RjdMD84XKpJKbJ6byq0TyJN8Wo+uOZakN:WQXZcvUtYRcGLoHvJQb8WoIN

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in System32 directory 24 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase Order 202319876.exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase Order 202319876.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Users\Admin\AppData\Local\Temp\Purchase Order 202319876.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase Order 202319876.exe"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        3⤵
        • Accesses Microsoft Outlook profiles
        • outlook_office_path
        • outlook_win_path
        PID:396
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:1896
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Executes dropped EXE
    PID:4512
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:3888
    • C:\Windows\system32\fxssvc.exe
      C:\Windows\system32\fxssvc.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1140
    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:4688
    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:4584
    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
      "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2312
    • C:\Windows\System32\msdtc.exe
      C:\Windows\System32\msdtc.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:3104
    • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
      "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
      1⤵
      • Executes dropped EXE
      PID:4000
    • C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
      C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
      1⤵
      • Executes dropped EXE
      PID:2224
    • C:\Windows\SysWow64\perfhost.exe
      C:\Windows\SysWow64\perfhost.exe
      1⤵
      • Executes dropped EXE
      PID:2672
    • C:\Windows\system32\locator.exe
      C:\Windows\system32\locator.exe
      1⤵
      • Executes dropped EXE
      PID:4988
    • C:\Windows\System32\SensorDataService.exe
      C:\Windows\System32\SensorDataService.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      PID:3876
    • C:\Windows\System32\snmptrap.exe
      C:\Windows\System32\snmptrap.exe
      1⤵
      • Executes dropped EXE
      PID:1652
    • C:\Windows\system32\spectrum.exe
      C:\Windows\system32\spectrum.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      PID:1832
    • C:\Windows\System32\OpenSSH\ssh-agent.exe
      C:\Windows\System32\OpenSSH\ssh-agent.exe
      1⤵
      • Executes dropped EXE
      PID:1276
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc
      1⤵
        PID:1880
      • C:\Windows\system32\TieringEngineService.exe
        C:\Windows\system32\TieringEngineService.exe
        1⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:5100
      • C:\Windows\system32\AgentService.exe
        C:\Windows\system32\AgentService.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2712
      • C:\Windows\System32\vds.exe
        C:\Windows\System32\vds.exe
        1⤵
        • Executes dropped EXE
        PID:1324
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3724
      • C:\Windows\system32\wbengine.exe
        "C:\Windows\system32\wbengine.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2708
      • C:\Windows\system32\wbem\WmiApSrv.exe
        C:\Windows\system32\wbem\WmiApSrv.exe
        1⤵
        • Executes dropped EXE
        PID:3700
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4744
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
          • Modifies data under HKEY_USERS
          PID:3328
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 896
          2⤵
          • Modifies data under HKEY_USERS
          PID:5104

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

        Filesize

        2.1MB

        MD5

        80eb89c2763d1504b7c8db585b22ca7f

        SHA1

        3e71a60cc2312a1f0280870e4f6e8acc53b1b248

        SHA256

        c6012100b4a85c36068032449a52e5b814b58eb748124bdaabd890227d78b74f

        SHA512

        71c29131cee54a23cdccd9cc1ff799dc09a97673974e16055052763f08cac07926dcb7eec57526030486d0251de06069b6076f8713ba67ea267343e6fa0e5381

      • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

        Filesize

        1.4MB

        MD5

        639ffcaa788353c68c4eb3df0d76dc4d

        SHA1

        4b079b1336d5e977d724e1b72457d8b977124a00

        SHA256

        57a9d810c4291230c2528ae265353f2f3569947da3150df43896c87074996a46

        SHA512

        854d65149aac9d5c4fa1742cfd1401cfc4893a0d3b2d8098a4ea1c25856c29b1a0619d2f86fc3de5af3bb8796c2cb353283fd7bc919c470541e2849853353fa5

      • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

        Filesize

        1.5MB

        MD5

        ef668c4fc309ddde81f26a0ad189c78d

        SHA1

        c43a3e87732eaf9e7a6c137b27a97e5fa817a1d7

        SHA256

        a191e009e2ab41961faa8eab435c2151ab487b994a60d17d458a4debad705aff

        SHA512

        36bbc82b266267c719aa7b9e4df928279beeb4fba3a85f891a18a4e8deb6f2391289f9d3ad0fcdc2608c25ad508a3e0fd2c7ce0cc915e7ba591e983914523ea5

      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

        Filesize

        2.1MB

        MD5

        0448cda5410589523f7df1a145d977df

        SHA1

        c00c36c5fd85042d45310e20b8f3e105ae503bfd

        SHA256

        a361ad0ceec272ac9ae370b24ce1f5f5361013272de75c691a9083ac3a34d79d

        SHA512

        fd08d550bb738d3551f7f7e133d30e367d7d498b26a23a135fcfdf06d7d7e0f721c84df244a606efece48260e20bf3361316d4d080db7a9961133cfca3e70c13

      • C:\Windows\SysWOW64\perfhost.exe

        Filesize

        1.2MB

        MD5

        4559c2ee867b41a20138ab632b2e995a

        SHA1

        cfa1f6bca406a40a92616150e128f72bb317b82d

        SHA256

        6487ed868fc39a3bd2c0577f48849d4a546bbf264bdc893aaa1fb20bf0a85bf9

        SHA512

        9a285cfbe2a70df79ab2ca9439c700925ea63189505891b4fada480c9ee0f1635771c272ef45ee18111385aad079083492e87a4e69ca039206f0e6d641ea5205

      • C:\Windows\System32\AgentService.exe

        Filesize

        1.7MB

        MD5

        780e78a900cc1a95516dad15ed7ce8a7

        SHA1

        d6ae1f629ba7669f303828ac11671f01f563b8f3

        SHA256

        fc3f11f88d9b282aaf677aa8c794aaff0af4c6014f0670e0b7f72cfbdde0088d

        SHA512

        3655db9521e51dbae7770adc7849d389ee04e57dd9cfd18035cb0e53c2b700c3b97099e980bfde1dc20b542a32c16c74b3d3c9b2180f31583b68e41c36da21b6

      • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

        Filesize

        1.3MB

        MD5

        a7bedeaf1faa6d823085d753e872e90a

        SHA1

        8bb802b11f99b9e14e494077341261365b418562

        SHA256

        45026da3071b382aa0fadd58ef02ec35186cd58c23d7436e1f351f680631e539

        SHA512

        644be12412e4802806be381f1b7077dbdf959c444c51c068995745f696acf5b3ba068c6754c21afb928755cabec015bd64654047d7bc06f39b77204bad254309

      • C:\Windows\System32\FXSSVC.exe

        Filesize

        1.2MB

        MD5

        65a94677ceda56a186772a31082441eb

        SHA1

        545e1c76b96bc51ba16fc2f47a074ce20d20fd7a

        SHA256

        5c03a187ce7ca24a780a677e298bc2bc7164c155f9ec414093d1fbbc4418d156

        SHA512

        fff66b104cc4ef963ef213d1f990e254e0ab5cfbab71eae8aac3d34cc2d2e703b4aa39780ebdecd02924e817ae04749bc27cf969b04987ae5b741bf1b89166c7

      • C:\Windows\System32\Locator.exe

        Filesize

        1.2MB

        MD5

        2d0cebd3dfe4df6e1d94381b87109462

        SHA1

        25f2cf9b2d227183ee6b8b07973f9bb125989365

        SHA256

        f41c0f7ceb356b0edcb97e843ccf1e35f04ab06a5be7832282b746f8486223f0

        SHA512

        2524763e8b3476cb0e4803b9f8ce6e4aef65561e857c2582ee7a4b9872260fb0a31f326df3ee0691b632d093b1e5320680005b8dcf878035f441f2635895fca9

      • C:\Windows\System32\OpenSSH\ssh-agent.exe

        Filesize

        1.6MB

        MD5

        95d4d6d0d9ece3d359d1d60434c7b57e

        SHA1

        4f373186b6a495ac19f7354540462294ff94a489

        SHA256

        c4b745a13ffca9b247335c3ac13f6c5b0172fdabc207c39116d65be64e3902d2

        SHA512

        4d1cd2858027b27c055579b89bf393572bfb4cea245d911a3bc4b564af9d0f586ba7faaffac6519cbb1c1120664ce13af52dba76e8d6302c15029fe14649642b

      • C:\Windows\System32\OpenSSH\ssh-agent.exe

        Filesize

        1.6MB

        MD5

        95d4d6d0d9ece3d359d1d60434c7b57e

        SHA1

        4f373186b6a495ac19f7354540462294ff94a489

        SHA256

        c4b745a13ffca9b247335c3ac13f6c5b0172fdabc207c39116d65be64e3902d2

        SHA512

        4d1cd2858027b27c055579b89bf393572bfb4cea245d911a3bc4b564af9d0f586ba7faaffac6519cbb1c1120664ce13af52dba76e8d6302c15029fe14649642b

      • C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe

        Filesize

        1.3MB

        MD5

        b08d04be1805480ccf564d7cb983ca5c

        SHA1

        21be612ab884cfac27d6099c49971735917ceb9d

        SHA256

        9311847e3536c6ad27352fb22722fe56f5818a2070310ed426130ebb4ae89566

        SHA512

        b8fefd7ec7f50ac3a7ccea84d06f25d7e024d95b90c6bf538bdc780c359d8609237a3115dd90ca4c52847309924960eeed61c3e4bf3141ceaba01edfbe3890c4

      • C:\Windows\System32\SearchIndexer.exe

        Filesize

        1.4MB

        MD5

        1d751d9277e24b31215154a31405ed8a

        SHA1

        c9818cee5d79e2024a6e0ef1aa9c6f6761dc2911

        SHA256

        da80a688f94f1ec30798d9fc9d4feb3ac3ab775ead8e88dacc80d69215133288

        SHA512

        54e493844511a39fc4058824a0c8526adbb8c23ca7f01179cfcba1dcf21f8a00342df0183b9f4066cb6ebdf0a12d8bd1633c126184c98d7aa8604963d7ed95f5

      • C:\Windows\System32\SensorDataService.exe

        Filesize

        1.8MB

        MD5

        23680fda83491a440db4ac5868f2f434

        SHA1

        1cefd1397b81d77177a03b8e316728039d154a7c

        SHA256

        68a72aa1bdd395d8d95a774df06cc6d7552b2ddfd6fec5a6a834d55c4a8f8bdd

        SHA512

        23d5898eb950d17715949598976b8f2ff8c62460f737509989d332d75e59d6bfbe8094d3f99c0f0f40d027a2a84be8ca45c77c4c97a662039f41d0153959ca2e

      • C:\Windows\System32\Spectrum.exe

        Filesize

        1.4MB

        MD5

        391a9fc80e43e65b51c37d56b4a6a5eb

        SHA1

        8cb05f830d4b3def663e1eec24a3da6df5af27c0

        SHA256

        4aeeb23b9a04f6d31cc4f1a1fcbe16b70f2b6da3797959945113ced6fc9bf35b

        SHA512

        58ad6479b1c85ca3a945bdc149fa03059e685676de292650ea66eb02b7d346a01bb81c8f695c738b9cec2957a93170d4e47493fad9eae8c3b120fb8e406bbb40

      • C:\Windows\System32\TieringEngineService.exe

        Filesize

        1.5MB

        MD5

        1e436dd66023675b21b97e93ba9c2665

        SHA1

        b6e1a246cc3ad91f99da1a1db9b89734107d1b6f

        SHA256

        85a9e0f9413182d5ca3e302f8f9cec891db2e7f5d875ce3b3a669e9c5aa024f5

        SHA512

        42a638b7147500b75c5434695a2beb5baa0d37b42efe9a6ab7fcd05a3ea4823397fcfcf6bd50ca6e9c4999f438462021132337dd7272f8466135a361e314c3b4

      • C:\Windows\System32\VSSVC.exe

        Filesize

        2.0MB

        MD5

        b216591892bda06c4f1af5ededd13bab

        SHA1

        bb912fdc6d9727e2d2d395e5bc30409f85a0bb4d

        SHA256

        7803ab7979d30e8a6b5bddc1fef866779f24581ebb6722b407cc8e5bbe6cab10

        SHA512

        1cacbfe769c2ccfbeb07feee79e0e10c9b53e17fc6cfde4df6486b1a09852405e3423bb67d20cb414ff3a19d261ff1a9f0f91d3167c72ef3891aa7971508fbaa

      • C:\Windows\System32\alg.exe

        Filesize

        1.3MB

        MD5

        07ed303472c324cf534760ec7dce4f9d

        SHA1

        353fbcf7f979a46ac15d9c07036942dae1b2253e

        SHA256

        49f04ee97bf971bc3c68cbcacf6f7b7f985b22aea9be263a69210aa0437a7ec2

        SHA512

        c43ed8fecfedc6730f61540a62e0eba125878b102e03849bf8913d454c072453b6b73f3e20e0d3576682a180a57feaeaf5dd862ec066e50b5f16732cb9ca6579

      • C:\Windows\System32\msdtc.exe

        Filesize

        1.4MB

        MD5

        8be43c2b34c6d37e584751e88b0760da

        SHA1

        5acd7ef22cc0859161f0c5b881efd481e9b21028

        SHA256

        c364140a31eac6e16419291e51a2f3420bb82e09bc3b3e7a88e9116122abe83a

        SHA512

        26e3b18d576c0542971030cf8eb644b453eca95b9744763b0a27b52643d7926a630f6811a7f664e44df61f27ddafb77293e25087fe787c51f751d0b4b2d1c294

      • C:\Windows\System32\snmptrap.exe

        Filesize

        1.2MB

        MD5

        042aae190d2f14c7e185091670ee33d3

        SHA1

        e0c9f43ba663de7c3e61672b4282d6d8d7d44260

        SHA256

        70f10f6a1b085a67b069833d03b43724a007d3e6136ce029c4c440a038ce3c28

        SHA512

        38da9bf86ffa2689fb5e8d74394dc7d4c3c3243b11d0d6bd1b54f7c28471a5a59f8215266d2d6f7af2861cd3013fb7d6c785c775d528006b5ae4d16709385fa9

      • C:\Windows\System32\vds.exe

        Filesize

        1.3MB

        MD5

        ce52266036f808c930d0042961bc82d0

        SHA1

        daddce2ed82b555405fd3b559ce7865ba71f48d6

        SHA256

        5b345a4a9405f9c3925439f6c33ae24bc27d08df99961b2740cfd703e2f1c222

        SHA512

        c9b27f70b8b5f616db97e39a8103beb61e9813863a66f7cea9c0b1ff5bed07ae665bec13a1279bc99b0007a4e42569e8f84a1e69543285b45a96d1d1b9e98a43

      • C:\Windows\System32\wbem\WmiApSrv.exe

        Filesize

        1.4MB

        MD5

        06ef57010eaa0c0d8f053de5f0d9143d

        SHA1

        3a88cc7773293bc8cc6096e463f73c2bf6fa0ad9

        SHA256

        356bc297c64d0598f038d4b36cb48cb52fb7de85944325e2acf6cc42cbc93057

        SHA512

        99a8f13cbb1469715723b24f560637ab57203b8db4dbb45af63e79667d3513b389d8308e1ef4e7bbbc4c363fd5c66a6132b4d6cf93fc96930eb770801d25f1cd

      • C:\Windows\System32\wbengine.exe

        Filesize

        2.1MB

        MD5

        b5e3b7f7569144dd62fb4e8414c63e76

        SHA1

        4fcae829417ffd8b03d83f9bc45ece71ac713620

        SHA256

        1468bdf92c3328d967f6ed28746a798f125974b5d8b1cafd333c6b363f776aa6

        SHA512

        df13cdbdaaf7f0f0d88c7f7264073adf6e1330f306fd6aa540801407970ee4d211e3997aa00d2b31b9b9b510d0a579496fab02e8f0ca39f22aef2272ad85bacb

      • memory/396-494-0x0000000000960000-0x00000000009C6000-memory.dmp

        Filesize

        408KB

      • memory/396-510-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/432-139-0x00000000095B0000-0x000000000964C000-memory.dmp

        Filesize

        624KB

      • memory/432-133-0x0000000000AE0000-0x0000000000C90000-memory.dmp

        Filesize

        1.7MB

      • memory/432-137-0x0000000005660000-0x000000000566A000-memory.dmp

        Filesize

        40KB

      • memory/432-136-0x0000000005790000-0x0000000005822000-memory.dmp

        Filesize

        584KB

      • memory/432-135-0x0000000005CA0000-0x0000000006244000-memory.dmp

        Filesize

        5.6MB

      • memory/432-134-0x0000000005640000-0x0000000005650000-memory.dmp

        Filesize

        64KB

      • memory/432-138-0x0000000005640000-0x0000000005650000-memory.dmp

        Filesize

        64KB

      • memory/1140-195-0x0000000140000000-0x0000000140135000-memory.dmp

        Filesize

        1.2MB

      • memory/1140-192-0x0000000000830000-0x0000000000890000-memory.dmp

        Filesize

        384KB

      • memory/1140-180-0x0000000000830000-0x0000000000890000-memory.dmp

        Filesize

        384KB

      • memory/1140-186-0x0000000000830000-0x0000000000890000-memory.dmp

        Filesize

        384KB

      • memory/1140-189-0x0000000140000000-0x0000000140135000-memory.dmp

        Filesize

        1.2MB

      • memory/1276-337-0x0000000140000000-0x0000000140259000-memory.dmp

        Filesize

        2.3MB

      • memory/1324-370-0x0000000140000000-0x0000000140147000-memory.dmp

        Filesize

        1.3MB

      • memory/1652-317-0x0000000140000000-0x00000001401ED000-memory.dmp

        Filesize

        1.9MB

      • memory/1832-554-0x0000000140000000-0x0000000140169000-memory.dmp

        Filesize

        1.4MB

      • memory/1832-320-0x0000000140000000-0x0000000140169000-memory.dmp

        Filesize

        1.4MB

      • memory/1896-156-0x0000000000690000-0x00000000006F0000-memory.dmp

        Filesize

        384KB

      • memory/1896-162-0x0000000000690000-0x00000000006F0000-memory.dmp

        Filesize

        384KB

      • memory/1896-170-0x0000000140000000-0x0000000140201000-memory.dmp

        Filesize

        2.0MB

      • memory/2224-466-0x0000000140000000-0x0000000140202000-memory.dmp

        Filesize

        2.0MB

      • memory/2224-260-0x0000000140000000-0x0000000140202000-memory.dmp

        Filesize

        2.0MB

      • memory/2312-229-0x0000000140000000-0x0000000140221000-memory.dmp

        Filesize

        2.1MB

      • memory/2312-217-0x0000000000CD0000-0x0000000000D30000-memory.dmp

        Filesize

        384KB

      • memory/2312-223-0x0000000000CD0000-0x0000000000D30000-memory.dmp

        Filesize

        384KB

      • memory/2312-227-0x0000000000CD0000-0x0000000000D30000-memory.dmp

        Filesize

        384KB

      • memory/2672-278-0x0000000000400000-0x00000000005EE000-memory.dmp

        Filesize

        1.9MB

      • memory/2708-599-0x0000000140000000-0x0000000140216000-memory.dmp

        Filesize

        2.1MB

      • memory/2708-391-0x0000000140000000-0x0000000140216000-memory.dmp

        Filesize

        2.1MB

      • memory/2712-358-0x0000000140000000-0x00000001401C0000-memory.dmp

        Filesize

        1.8MB

      • memory/2712-355-0x0000000140000000-0x00000001401C0000-memory.dmp

        Filesize

        1.8MB

      • memory/3068-144-0x0000000002B60000-0x0000000002BC6000-memory.dmp

        Filesize

        408KB

      • memory/3068-149-0x0000000002B60000-0x0000000002BC6000-memory.dmp

        Filesize

        408KB

      • memory/3068-167-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/3068-143-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/3068-140-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB

      • memory/3104-240-0x0000000140000000-0x0000000140210000-memory.dmp

        Filesize

        2.1MB

      • memory/3104-231-0x00000000007E0000-0x0000000000840000-memory.dmp

        Filesize

        384KB

      • memory/3700-414-0x0000000140000000-0x000000014021D000-memory.dmp

        Filesize

        2.1MB

      • memory/3700-600-0x0000000140000000-0x000000014021D000-memory.dmp

        Filesize

        2.1MB

      • memory/3724-371-0x0000000140000000-0x00000001401FC000-memory.dmp

        Filesize

        2.0MB

      • memory/3724-585-0x0000000140000000-0x00000001401FC000-memory.dmp

        Filesize

        2.0MB

      • memory/3876-486-0x0000000140000000-0x00000001401D7000-memory.dmp

        Filesize

        1.8MB

      • memory/3876-299-0x0000000140000000-0x00000001401D7000-memory.dmp

        Filesize

        1.8MB

      • memory/4000-258-0x0000000140000000-0x0000000140226000-memory.dmp

        Filesize

        2.1MB

      • memory/4512-188-0x0000000140000000-0x0000000140200000-memory.dmp

        Filesize

        2.0MB

      • memory/4512-169-0x00000000006A0000-0x0000000000700000-memory.dmp

        Filesize

        384KB

      • memory/4512-176-0x00000000006A0000-0x0000000000700000-memory.dmp

        Filesize

        384KB

      • memory/4584-387-0x0000000140000000-0x000000014022B000-memory.dmp

        Filesize

        2.2MB

      • memory/4584-205-0x0000000000190000-0x00000000001F0000-memory.dmp

        Filesize

        384KB

      • memory/4584-207-0x0000000140000000-0x000000014022B000-memory.dmp

        Filesize

        2.2MB

      • memory/4584-213-0x0000000000190000-0x00000000001F0000-memory.dmp

        Filesize

        384KB

      • memory/4688-194-0x0000000000C20000-0x0000000000C80000-memory.dmp

        Filesize

        384KB

      • memory/4688-389-0x0000000140000000-0x0000000140237000-memory.dmp

        Filesize

        2.2MB

      • memory/4688-201-0x0000000000C20000-0x0000000000C80000-memory.dmp

        Filesize

        384KB

      • memory/4688-210-0x0000000140000000-0x0000000140237000-memory.dmp

        Filesize

        2.2MB

      • memory/4744-415-0x0000000140000000-0x0000000140179000-memory.dmp

        Filesize

        1.5MB

      • memory/4744-601-0x0000000140000000-0x0000000140179000-memory.dmp

        Filesize

        1.5MB

      • memory/4988-281-0x0000000140000000-0x00000001401EC000-memory.dmp

        Filesize

        1.9MB

      • memory/4988-506-0x0000000140000000-0x00000001401EC000-memory.dmp

        Filesize

        1.9MB

      • memory/5100-568-0x0000000140000000-0x0000000140239000-memory.dmp

        Filesize

        2.2MB

      • memory/5100-339-0x0000000140000000-0x0000000140239000-memory.dmp

        Filesize

        2.2MB

      • memory/5104-705-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-718-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-704-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-654-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-706-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-707-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-708-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-709-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-710-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-703-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-719-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-731-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-732-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-733-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-734-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-735-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-736-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-737-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5104-738-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB