Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2023 19:30

General

  • Target

    SecuriteInfo.com.Heur.24719.4239.exe

  • Size

    1.6MB

  • MD5

    170860057f4aad06ddbeea0ca2b3f1b6

  • SHA1

    db04c735b769df458518f959ae7eca39cfa06213

  • SHA256

    e2c74cd730a858e1104119028b3d80e338900723485e5f8b6c02fd8eb459a998

  • SHA512

    f8bf57126bad026be2414121c798d5688119f06312404c35dea3f457deb717f6422291f5401178586fd23055577f893b4e6236e413c909e3b526c45d3b957766

  • SSDEEP

    24576:uU7taDBzgNEfeEvFTMxdzYPh1ogay/zj1weNgcHFx5MpfTjU/c7jNXPohE:uU7PNBmMxdEvogdzxzHFx+pfTgE7VPI

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in System32 directory 24 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.24719.4239.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.24719.4239.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4196
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.24719.4239.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.24719.4239.exe"
      2⤵
        PID:4240
      • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.24719.4239.exe
        "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.24719.4239.exe"
        2⤵
          PID:1116
        • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.24719.4239.exe
          "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.24719.4239.exe"
          2⤵
            PID:2224
          • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.24719.4239.exe
            "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.24719.4239.exe"
            2⤵
              PID:3496
            • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.24719.4239.exe
              "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.24719.4239.exe"
              2⤵
              • Drops file in System32 directory
              • Suspicious use of SetThreadContext
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3332
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                3⤵
                • Accesses Microsoft Outlook profiles
                • outlook_office_path
                • outlook_win_path
                PID:4648
          • C:\Windows\System32\alg.exe
            C:\Windows\System32\alg.exe
            1⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            PID:3228
          • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
            C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
            1⤵
            • Executes dropped EXE
            PID:3500
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
            1⤵
              PID:4788
            • C:\Windows\system32\fxssvc.exe
              C:\Windows\system32\fxssvc.exe
              1⤵
              • Executes dropped EXE
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:1252
            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
              1⤵
              • Executes dropped EXE
              PID:4036
            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
              1⤵
              • Executes dropped EXE
              PID:4640
            • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
              "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
              1⤵
              • Executes dropped EXE
              PID:3816
            • C:\Windows\System32\msdtc.exe
              C:\Windows\System32\msdtc.exe
              1⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Drops file in Windows directory
              PID:2612
            • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
              "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
              1⤵
              • Executes dropped EXE
              PID:1892
            • C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
              C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
              1⤵
              • Executes dropped EXE
              PID:1372
            • C:\Windows\SysWow64\perfhost.exe
              C:\Windows\SysWow64\perfhost.exe
              1⤵
              • Executes dropped EXE
              PID:3240
            • C:\Windows\system32\locator.exe
              C:\Windows\system32\locator.exe
              1⤵
              • Executes dropped EXE
              PID:3452
            • C:\Windows\System32\SensorDataService.exe
              C:\Windows\System32\SensorDataService.exe
              1⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              PID:1696
            • C:\Windows\System32\snmptrap.exe
              C:\Windows\System32\snmptrap.exe
              1⤵
              • Executes dropped EXE
              PID:1900
            • C:\Windows\system32\spectrum.exe
              C:\Windows\system32\spectrum.exe
              1⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              PID:3980
            • C:\Windows\System32\OpenSSH\ssh-agent.exe
              C:\Windows\System32\OpenSSH\ssh-agent.exe
              1⤵
              • Executes dropped EXE
              PID:3824
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc
              1⤵
                PID:4916
              • C:\Windows\system32\TieringEngineService.exe
                C:\Windows\system32\TieringEngineService.exe
                1⤵
                • Executes dropped EXE
                • Checks processor information in registry
                • Suspicious use of AdjustPrivilegeToken
                PID:2488
              • C:\Windows\system32\AgentService.exe
                C:\Windows\system32\AgentService.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:4360
              • C:\Windows\System32\vds.exe
                C:\Windows\System32\vds.exe
                1⤵
                • Executes dropped EXE
                PID:4232
              • C:\Windows\system32\vssvc.exe
                C:\Windows\system32\vssvc.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:4656
              • C:\Windows\system32\wbengine.exe
                "C:\Windows\system32\wbengine.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2952
              • C:\Windows\system32\wbem\WmiApSrv.exe
                C:\Windows\system32\wbem\WmiApSrv.exe
                1⤵
                • Executes dropped EXE
                PID:4932
              • C:\Windows\system32\SearchIndexer.exe
                C:\Windows\system32\SearchIndexer.exe /Embedding
                1⤵
                • Executes dropped EXE
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2024
                • C:\Windows\system32\SearchProtocolHost.exe
                  "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                  2⤵
                  • Modifies data under HKEY_USERS
                  PID:2192
                • C:\Windows\system32\SearchFilterHost.exe
                  "C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 896
                  2⤵
                  • Modifies data under HKEY_USERS
                  PID:3448

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

                Filesize

                2.1MB

                MD5

                d7dfeab5894d679932d510f780df4e1c

                SHA1

                d51d346c47519f3729b598679cadeb1a10d0136e

                SHA256

                7ffe6b8984c8130b406eb3877b296e14e17d1c665bf677ddc2edfbd91711891e

                SHA512

                d6a496581bc55b85c652400c5f25f8beada0df0b5bf52556e46274b346d6fd4d080870ee64e2dc5d9ca4de2598653fe962fe08d608e6033eeba1c1e3e6f35280

              • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                Filesize

                1.4MB

                MD5

                322fc278922d2b72410d016110ec81f0

                SHA1

                a3df931741d099de375dd0e407dfbf77a18d723e

                SHA256

                a9b27beec4315fa2bd1fd742bf2cdd2da963f5b5c2883b02f11ada9538aafdcd

                SHA512

                30c75486a0590ab71396d79a6ee4923a2afc59d51ee80df62b36b0c5ed392954e0b5dc2b21a8d62505f751fcdcb6b8abe0f2951013311490c631c62606b79b0d

              • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

                Filesize

                1.5MB

                MD5

                e8a6904d98db79c1530f4d8b55503c89

                SHA1

                73a644d0b750d36339094f3feabb78b51fa042b5

                SHA256

                8f03589cbc748b89e0ecf645d1b1971d4d11c302a585fc26b1501fc092204d0d

                SHA512

                c4650a4b2a6e687399a507222afa7652d50d0d74b83dea5b01e834baffba9751bd9f326878713a02bc4e42ca1d432d7f631d5e6225c6f7d81d49e213d1bb325a

              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

                Filesize

                2.1MB

                MD5

                4d66cfc9c219edb9359eaf72b7c3bbd1

                SHA1

                1a5b7cdf34474f840f79446eb9077236498a2a12

                SHA256

                6c9570b8661dfa31cba1eefa9054ca489a4dba888df4f0460f366b72476bef0f

                SHA512

                7a97298a09389f7a302f2e616efad18d95c75532d9900949b68a4457675c6d08cbe58aa1bb97a754ce01f5f625d4da225cddacd1dcc5f53a963915d0dc971234

              • C:\Windows\SysWOW64\perfhost.exe

                Filesize

                1.2MB

                MD5

                cc982a8c1e9a51b529ee8521082e2c54

                SHA1

                37cad7441bb3390a590d2b65a4109ab2793d46ea

                SHA256

                59e9144a4f2510bb774a7c14c2d9caff43582fedb8cfaa01b776fa2e4971f22e

                SHA512

                e798ddd6c5478c8edfaa30c94b989be63009ef4cf40618542468f083784489cc16be6f4f13b2525159605abb6ee08f9d63a55a29bd7c09add04a3e38746b76ae

              • C:\Windows\System32\AgentService.exe

                Filesize

                1.7MB

                MD5

                25984cb79fa6320f7a8c17cfb8343059

                SHA1

                4f738046438369427aa98b987dfd65b7ec93f9ec

                SHA256

                5560b6e352333ca6ae4c8cdd0464e78b7173551e473eb612e75533fa76a3d0a4

                SHA512

                47dee71391a2a3f90a9c544aaaab2a9868cf838539a222cccfc6055e59e21f7102f84bccc36e948022b110ba3470f34316f9390bbf2b796bcd247af77d7aaf32

              • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

                Filesize

                1.3MB

                MD5

                297e73a07709d82e57871cdc1da5e15c

                SHA1

                8d307c866623de870bc17a70a3738cb19096ee28

                SHA256

                88c81588c15f4a2afa7bff70bd1c1bb54c64598ede8bf7d6e3782813d53f215c

                SHA512

                563a242c0da22c0a72e0143990d0e1f60d4418b7ea3578eeb962da1b306dfc009b6660ddf27b5fbb91ced6cb9e7db8c7c598bd041ef3378be03b08aed9e4ae55

              • C:\Windows\System32\FXSSVC.exe

                Filesize

                1.2MB

                MD5

                f48a90451c74b5cb6ac982dc56bbe52c

                SHA1

                829c9b55e2979a244f704411dfeb6ca0e33ad93d

                SHA256

                ce5c4ac65bd18d3d7c0ccac35f59333eb82d2fdeebe45e709f7919f0a6d48424

                SHA512

                49739aba1025aeaa5818bd5f47c559557cec96274ceb12ce2b16fd260fe36108cf1644d1fc0954d71a3e7173bb025d4068c11b9863e72160e3c5235ac85d22f9

              • C:\Windows\System32\Locator.exe

                Filesize

                1.2MB

                MD5

                1a396e0cf2fdc2378bbab0c03daa3bf0

                SHA1

                a1dd014477181909b6fd228f06723f73d24f078c

                SHA256

                99234ff634daabce9ff789d29b65955814e65cd86319bd809310c1a1e24cefc7

                SHA512

                76c3622b9b642467319270533798e8ab2c92fa95546c11ea5471ff6eed9035cf481fff3c98b0793ffe4676a51ea487136da5d4d109ea0f8efde82c8eb2c8078a

              • C:\Windows\System32\OpenSSH\ssh-agent.exe

                Filesize

                1.6MB

                MD5

                a7048c69d805dfb7119adb8866f71b2c

                SHA1

                2681e9811c4bd1dfa726f5056d7524b9be3b5394

                SHA256

                3e3bdee38df0179d58f08ae10f1265a3c96c8ec9f3b77307e12ee64cf7fccc0e

                SHA512

                d71581b7dbf7d4f95eec0ae409ebe21c7adf68559c5a8ab60770a1fc89850f0e7916515b5fd6a86faad0aaad43a06cf94f20b5f6af097c2ccc2f91a6d4b61d8d

              • C:\Windows\System32\OpenSSH\ssh-agent.exe

                Filesize

                1.6MB

                MD5

                a7048c69d805dfb7119adb8866f71b2c

                SHA1

                2681e9811c4bd1dfa726f5056d7524b9be3b5394

                SHA256

                3e3bdee38df0179d58f08ae10f1265a3c96c8ec9f3b77307e12ee64cf7fccc0e

                SHA512

                d71581b7dbf7d4f95eec0ae409ebe21c7adf68559c5a8ab60770a1fc89850f0e7916515b5fd6a86faad0aaad43a06cf94f20b5f6af097c2ccc2f91a6d4b61d8d

              • C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe

                Filesize

                1.3MB

                MD5

                f6ec7243bfd5aa9460986a9973b9ead0

                SHA1

                633fddd3e7b901a8f0784bd3ab817fd7ebb5dddd

                SHA256

                3d4ad01fa64f74ec240d9db9b6b7537ce94114e7c93a20a003348553542d7e3a

                SHA512

                937133967eff81e4dcf9ce2aacbb28e337b7086fd56149abe3900c8e9b0a20df163934060559f576650e51e13069bd64ff548ecdd3402e326fb257d17b432159

              • C:\Windows\System32\SearchIndexer.exe

                Filesize

                1.4MB

                MD5

                0e4a37364f913d3c2492cd973f2e5175

                SHA1

                96feb09ec2013a46d9772998a94e392369b8949b

                SHA256

                4484c236547102c4d0f14f85b20286cab03b84e7d66936ec7ee45aa9497639ad

                SHA512

                0eafa7ca11037fad8a7153ddd44271253af776f65e09a699af5a692566c300c7da419c12857048cb01b0853250579abcca449cd49d577b80966ede03ca95b46f

              • C:\Windows\System32\SensorDataService.exe

                Filesize

                1.8MB

                MD5

                5da8d47f02195ca44d4145a2dc5ee1ae

                SHA1

                d0b091d72ec8c84a03483f4bc61e15be1fa5f20d

                SHA256

                3cc39ff2e2f6933de615d385e8f1213fe38a554faa2edd4d3c7a246d0fcab456

                SHA512

                5f156120f3863b96246d8e8467d868e148e8e68fda84f6149f3a58ce93c77b85fc568b0f429fe6e769e8b0649a2412f066e3938afba584f6829e89d7347628bd

              • C:\Windows\System32\Spectrum.exe

                Filesize

                1.4MB

                MD5

                6d434f019f2b58663f2a796d6e90ceb7

                SHA1

                b4b0ff84fd12bea2138627bcecbc7d2abd29be57

                SHA256

                4185e59bc984aee9d83aa0efcf5002960a1fc431a542ee2f27df61080a200402

                SHA512

                bff4f2f020bc21b121a359dfc46dd059bfc85fb155d77855e57abb07f445270ef75c377df067f5cce5c4cec32b4621d1ebccba16fc6f1e3ae0e1fd5483e47897

              • C:\Windows\System32\TieringEngineService.exe

                Filesize

                1.5MB

                MD5

                b707e8ee2d4cb6a06162e4de3e7fe7e0

                SHA1

                5cf9f69ba0dbcff9403ad711ddc3a1a573c39cc6

                SHA256

                3696ec2a28f228c24f3de214b185cabdde00adfe9b637c508404cc42e5b73147

                SHA512

                b95e8306251de66acdbe18ce8692cc3f213dc497e23836783cff5b4ab8f4917b5c6da5d4c3489452e99a33eb1254f6a51502af73d414c8d07657ec52629cd591

              • C:\Windows\System32\VSSVC.exe

                Filesize

                2.0MB

                MD5

                6b706914f6c0fbdb629b0d32ed3974ba

                SHA1

                882f49b6d492fc3b984517d7b6872deceed05d44

                SHA256

                b537e57565ea874041e8246545d853f45ada0dbe441f234af152243ac5dd17f2

                SHA512

                5b7701e88f23991933628a0fe5452cef793c803475d1caab9fc46116a0fee4914c1a63d3760d548a0995bef00bc03feca4e04a3cf393198bc0fccdfa772462a6

              • C:\Windows\System32\alg.exe

                Filesize

                1.3MB

                MD5

                2d3c5fba332954bb8d99424feb4ff60e

                SHA1

                3417e28e3f08a384f152318edbfb95b19e7678f8

                SHA256

                da2adc0f300ae2aa0b177d5499128267ee804e2cd1eb565ac2dfc082f5431b56

                SHA512

                a5619f0e87bf712a43073c161799dee6515d0545f913b21ce87082461b34a5c681674fac99e86185034175f0fe9dbc5f69b1e27bffff62370c40c4efa5a57a36

              • C:\Windows\System32\msdtc.exe

                Filesize

                1.4MB

                MD5

                63bbc84ff17f2aee763a20d00a6d06ee

                SHA1

                9161b3f1f5cdec4db9656da786b999c8f6afdbcc

                SHA256

                d043bc838a39a1e226bdb71ee0bf24b63480ea762f1e0ce77caaa4a1dafb026f

                SHA512

                c805daef0fbc3e156f0ddf1b0135661d56d818c2a19ac6e9db9b85d93ea7f369406c1516f6ba32f635f252caf8ee0d2aef872791d4a2c86299a6cfe1786057dd

              • C:\Windows\System32\snmptrap.exe

                Filesize

                1.2MB

                MD5

                506fede5d75c621ca4150c9df1addc2f

                SHA1

                99d98d5c4e9c3be9f90a724dd411534cb1d60358

                SHA256

                d42650e940fa0236e732abac33f1a7093439784be5734f9e356d9fb054a21d09

                SHA512

                1c95fca3d03f3363b809373a4449ab29e6b88c65c3b68ef86f5214576f66cc49340a957c61f03b425c6c9dd36791807008efbf8cf6248bae37c70dcb1a202db1

              • C:\Windows\System32\vds.exe

                Filesize

                1.3MB

                MD5

                a729e6926a36142d4b2b9bf69d52852e

                SHA1

                679bb564fde7d80cbc88e0602e7eb6c643c21c43

                SHA256

                beb1a83e8e95903ecb03ebfeac021ce2526f1fa21805d6eaff67cc74a8063d6d

                SHA512

                f7fc9ae8896db792156ade77ec678476c75eef2a23e12a3ab15a7889dfd09269272ed657731dcd53c201b8c83e5e13a78dbf340d7a3513feb6404e133463212c

              • C:\Windows\System32\wbem\WmiApSrv.exe

                Filesize

                1.4MB

                MD5

                19295e96e919856d0ff9b75c8e72f278

                SHA1

                1c8f74759670685582d6f4f8a2651389d98d8627

                SHA256

                c9d3354316646b18f03a780f13f54b048f7fde5bb6b4878c066a8e8e8891cf9d

                SHA512

                12094c37191b9527411f93a9ada9b85f764777fcb5b8c1f8400739ef080dd2d577026edb3d9472e05a7db9f63bdd5066601af177eec883f6271ed79518410836

              • C:\Windows\System32\wbengine.exe

                Filesize

                2.1MB

                MD5

                f2477bd30f0df762665813e80422125b

                SHA1

                2d8312b537d1cce0aa22a399130286dfa011fc75

                SHA256

                0511583e9920a1c0a5299fc671fb7ed8de6c875eb07a7ab689411d73caf7eb73

                SHA512

                3b8a0d21ae7ec1f8db1d4cd9a398657cc9cd93945a2653dae92cd2af510413de54ec9c716950b20e097a79ae18707e8715bbf3b1fc74400d1cdbb34790052b84

              • memory/1252-188-0x0000000000E40000-0x0000000000EA0000-memory.dmp

                Filesize

                384KB

              • memory/1252-192-0x0000000000E40000-0x0000000000EA0000-memory.dmp

                Filesize

                384KB

              • memory/1252-195-0x0000000140000000-0x0000000140135000-memory.dmp

                Filesize

                1.2MB

              • memory/1252-182-0x0000000000E40000-0x0000000000EA0000-memory.dmp

                Filesize

                384KB

              • memory/1372-278-0x0000000140000000-0x0000000140202000-memory.dmp

                Filesize

                2.0MB

              • memory/1696-583-0x0000000140000000-0x00000001401D7000-memory.dmp

                Filesize

                1.8MB

              • memory/1696-311-0x0000000140000000-0x00000001401D7000-memory.dmp

                Filesize

                1.8MB

              • memory/1892-553-0x0000000140000000-0x0000000140226000-memory.dmp

                Filesize

                2.1MB

              • memory/1892-256-0x0000000140000000-0x0000000140226000-memory.dmp

                Filesize

                2.1MB

              • memory/1900-333-0x0000000140000000-0x00000001401ED000-memory.dmp

                Filesize

                1.9MB

              • memory/2024-414-0x0000000140000000-0x0000000140179000-memory.dmp

                Filesize

                1.5MB

              • memory/2024-623-0x0000000140000000-0x0000000140179000-memory.dmp

                Filesize

                1.5MB

              • memory/2488-367-0x0000000140000000-0x0000000140239000-memory.dmp

                Filesize

                2.2MB

              • memory/2612-241-0x0000000000CE0000-0x0000000000D40000-memory.dmp

                Filesize

                384KB

              • memory/2612-258-0x0000000140000000-0x0000000140210000-memory.dmp

                Filesize

                2.1MB

              • memory/2952-393-0x0000000140000000-0x0000000140216000-memory.dmp

                Filesize

                2.1MB

              • memory/2952-619-0x0000000140000000-0x0000000140216000-memory.dmp

                Filesize

                2.1MB

              • memory/3228-157-0x00000000005C0000-0x0000000000620000-memory.dmp

                Filesize

                384KB

              • memory/3228-163-0x00000000005C0000-0x0000000000620000-memory.dmp

                Filesize

                384KB

              • memory/3228-172-0x0000000140000000-0x0000000140201000-memory.dmp

                Filesize

                2.0MB

              • memory/3240-584-0x0000000000400000-0x00000000005EE000-memory.dmp

                Filesize

                1.9MB

              • memory/3240-280-0x0000000000400000-0x00000000005EE000-memory.dmp

                Filesize

                1.9MB

              • memory/3332-145-0x00000000035E0000-0x0000000003646000-memory.dmp

                Filesize

                408KB

              • memory/3332-150-0x00000000035E0000-0x0000000003646000-memory.dmp

                Filesize

                408KB

              • memory/3332-200-0x0000000000400000-0x0000000000654000-memory.dmp

                Filesize

                2.3MB

              • memory/3332-144-0x0000000000400000-0x0000000000654000-memory.dmp

                Filesize

                2.3MB

              • memory/3332-143-0x0000000000400000-0x0000000000654000-memory.dmp

                Filesize

                2.3MB

              • memory/3332-140-0x0000000000400000-0x0000000000654000-memory.dmp

                Filesize

                2.3MB

              • memory/3448-668-0x0000019EAD830000-0x0000019EAD840000-memory.dmp

                Filesize

                64KB

              • memory/3448-637-0x0000019EAD810000-0x0000019EAD820000-memory.dmp

                Filesize

                64KB

              • memory/3448-665-0x0000019EAD830000-0x0000019EAD831000-memory.dmp

                Filesize

                4KB

              • memory/3448-638-0x0000019EAD830000-0x0000019EAD840000-memory.dmp

                Filesize

                64KB

              • memory/3452-308-0x0000000140000000-0x00000001401EC000-memory.dmp

                Filesize

                1.9MB

              • memory/3500-174-0x0000000140000000-0x0000000140200000-memory.dmp

                Filesize

                2.0MB

              • memory/3500-169-0x0000000000650000-0x00000000006B0000-memory.dmp

                Filesize

                384KB

              • memory/3500-177-0x0000000000650000-0x00000000006B0000-memory.dmp

                Filesize

                384KB

              • memory/3500-210-0x0000000140000000-0x0000000140200000-memory.dmp

                Filesize

                2.0MB

              • memory/3816-232-0x0000000000CD0000-0x0000000000D30000-memory.dmp

                Filesize

                384KB

              • memory/3816-231-0x0000000140000000-0x0000000140221000-memory.dmp

                Filesize

                2.1MB

              • memory/3816-236-0x0000000000CD0000-0x0000000000D30000-memory.dmp

                Filesize

                384KB

              • memory/3816-224-0x0000000000CD0000-0x0000000000D30000-memory.dmp

                Filesize

                384KB

              • memory/3816-238-0x0000000140000000-0x0000000140221000-memory.dmp

                Filesize

                2.1MB

              • memory/3824-337-0x0000000140000000-0x0000000140259000-memory.dmp

                Filesize

                2.3MB

              • memory/3824-604-0x0000000140000000-0x0000000140259000-memory.dmp

                Filesize

                2.3MB

              • memory/3980-603-0x0000000140000000-0x0000000140169000-memory.dmp

                Filesize

                1.4MB

              • memory/3980-335-0x0000000140000000-0x0000000140169000-memory.dmp

                Filesize

                1.4MB

              • memory/4036-211-0x0000000140000000-0x0000000140237000-memory.dmp

                Filesize

                2.2MB

              • memory/4036-196-0x00000000004D0000-0x0000000000530000-memory.dmp

                Filesize

                384KB

              • memory/4036-240-0x0000000140000000-0x0000000140237000-memory.dmp

                Filesize

                2.2MB

              • memory/4036-198-0x0000000140000000-0x0000000140237000-memory.dmp

                Filesize

                2.2MB

              • memory/4196-136-0x00000000058F0000-0x00000000058FA000-memory.dmp

                Filesize

                40KB

              • memory/4196-137-0x0000000005B40000-0x0000000005B50000-memory.dmp

                Filesize

                64KB

              • memory/4196-138-0x0000000005B40000-0x0000000005B50000-memory.dmp

                Filesize

                64KB

              • memory/4196-134-0x0000000005F30000-0x00000000064D4000-memory.dmp

                Filesize

                5.6MB

              • memory/4196-135-0x0000000005840000-0x00000000058D2000-memory.dmp

                Filesize

                584KB

              • memory/4196-139-0x0000000007AC0000-0x0000000007B5C000-memory.dmp

                Filesize

                624KB

              • memory/4196-133-0x0000000000D00000-0x0000000000E96000-memory.dmp

                Filesize

                1.6MB

              • memory/4232-389-0x0000000140000000-0x0000000140147000-memory.dmp

                Filesize

                1.3MB

              • memory/4360-366-0x0000000140000000-0x00000001401C0000-memory.dmp

                Filesize

                1.8MB

              • memory/4640-535-0x0000000140000000-0x000000014022B000-memory.dmp

                Filesize

                2.2MB

              • memory/4640-229-0x0000000140000000-0x000000014022B000-memory.dmp

                Filesize

                2.2MB

              • memory/4640-220-0x0000000000190000-0x00000000001F0000-memory.dmp

                Filesize

                384KB

              • memory/4640-214-0x0000000000190000-0x00000000001F0000-memory.dmp

                Filesize

                384KB

              • memory/4648-180-0x0000000000B00000-0x0000000000B66000-memory.dmp

                Filesize

                408KB

              • memory/4656-618-0x0000000140000000-0x00000001401FC000-memory.dmp

                Filesize

                2.0MB

              • memory/4656-390-0x0000000140000000-0x00000001401FC000-memory.dmp

                Filesize

                2.0MB

              • memory/4932-413-0x0000000140000000-0x000000014021D000-memory.dmp

                Filesize

                2.1MB

              • memory/4932-622-0x0000000140000000-0x000000014021D000-memory.dmp

                Filesize

                2.1MB