Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    70s
  • max time network
    74s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/10/2023, 08:03

General

  • Target

    Fluxus V7.exe

  • Size

    3.9MB

  • MD5

    b4f9cbca656fd34c4dbb1d706a7f1ad3

  • SHA1

    2b95d88a80ccb619b581c420f7435c660cfbb28e

  • SHA256

    1e022d3886700317e5c41977de8fd595db5fbb3529164048ed09ee7efdb5711d

  • SHA512

    5ed86eaf8ae42d9a8f0dca9776e25b3c2232434b32088df7feaa8149886594f1d4b1e37c597597eacebdb4082e0263441a6b78def5eef2ad610a6875c28fe969

  • SSDEEP

    49152:UgLIR9JyCns59qfuce05XlWycazyClY1YH8PnGpv80tbvvqVUcH:UgLIRfyC7egWJa3lY1U82kmvvoUc

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fluxus V7.exe
    "C:\Users\Admin\AppData\Local\Temp\Fluxus V7.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Users\Admin\AppData\Local\Temp\Fluxus\Fluxus V7.exe
      "C:\Users\Admin\AppData\Local\Temp\Fluxus\Fluxus V7.exe" /C Inject.bat
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4696
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:800
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4712
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1512
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4376
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4672
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1740
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:3628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

    Filesize

    45KB

    MD5

    0b5d94d20be9eecbaed3dddd04143f07

    SHA1

    c677d0355f4cc7301075a554adc889bce502e15a

    SHA256

    3c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c

    SHA512

    395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\45WHAWYF\challenge[2].htm

    Filesize

    342KB

    MD5

    a4325fa798ef6becdfe810e4d752c440

    SHA1

    83a10d06c0c7c2763c94f9780331a2d1d9d90fbe

    SHA256

    9cc2d9b5ca0f447c87454e3c73527a301eb5eda4b66c0c4e6f577f5b6ca2a1b5

    SHA512

    8c69e6c933281a293ab30d23dffa8dd09457aadc86defdeda2b4d4d48eeed597ee16637be20d35d899df484d441e33ba03b850a67961d6fdb5460d7620bb2950

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\45WHAWYF\css2[2].css

    Filesize

    716B

    MD5

    2a7f584ed43e7073e39cd63451d079e1

    SHA1

    6963da55c305b3bff79a95fdf299fcb113665d31

    SHA256

    a51b56b7a9dd18f9371dcd9ae13758336d88144417ceb12ef8eccdbc2546f568

    SHA512

    1eeeef7967ac42817bb7848e95bea210767fee343394ad7865437975f91d0a019518925c0ad5acdf9668a66c2f437123833ad0ffbb7ce615a75a80f9ec1314fe

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\8GQWYY60\Poppins-255d561d62b2019af045055ecea1b342746a57e564b2a0c477e27807d483c0fb7c00a681ddbf06dbb0aa375d5cfa0c7d91e9a3ed1352375ca40d28b756248f5[1].woff2

    Filesize

    50KB

    MD5

    5666785088e8a75f62ecbde341e86323

    SHA1

    ad982693d6da14a5171f2c9effa9189b2b49f482

    SHA256

    64dde3c4628776eae8ef19a7132532371ddc2eb02e6e293325b14820cb8813e8

    SHA512

    84126dd327417afa0c6fbd45160f016e4e85d4532deff955a5433ca0e25acc8045f85c1365b1a747a6e86630b0dc178c291295a2ecb2bc35cd74f86c33aee8e2

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF0EC0D8C89C00175C.TMP

    Filesize

    24KB

    MD5

    d3cdb7663712ddb6ef5056c72fe69e86

    SHA1

    f08bf69934fb2b9ca0aba287c96abe145a69366c

    SHA256

    3e8c2095986b262ac8fccfabda2d021fc0d3504275e83cffe1f0a333f9efbe15

    SHA512

    c0acd65db7098a55dae0730eb1dcd8aa94e95a71f39dd40b087be0b06afc5d1bb310f555781853b5a78a8803dba0fb44df44bd2bb14baeca29c7c7410dffc812

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\45WHAWYF\css2[2].css

    Filesize

    716B

    MD5

    2a7f584ed43e7073e39cd63451d079e1

    SHA1

    6963da55c305b3bff79a95fdf299fcb113665d31

    SHA256

    a51b56b7a9dd18f9371dcd9ae13758336d88144417ceb12ef8eccdbc2546f568

    SHA512

    1eeeef7967ac42817bb7848e95bea210767fee343394ad7865437975f91d0a019518925c0ad5acdf9668a66c2f437123833ad0ffbb7ce615a75a80f9ec1314fe

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\8GQWYY60\Poppins-255d561d62b2019af045055ecea1b342746a57e564b2a0c477e27807d483c0fb7c00a681ddbf06dbb0aa375d5cfa0c7d91e9a3ed1352375ca40d28b756248f5[1].woff2

    Filesize

    50KB

    MD5

    5666785088e8a75f62ecbde341e86323

    SHA1

    ad982693d6da14a5171f2c9effa9189b2b49f482

    SHA256

    64dde3c4628776eae8ef19a7132532371ddc2eb02e6e293325b14820cb8813e8

    SHA512

    84126dd327417afa0c6fbd45160f016e4e85d4532deff955a5433ca0e25acc8045f85c1365b1a747a6e86630b0dc178c291295a2ecb2bc35cd74f86c33aee8e2

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\MSWN74CN\Background[1].svg

    Filesize

    7KB

    MD5

    833162ab475d570e3071d3d7a842ead6

    SHA1

    fabf67d118dfb12eea35d073505a39f375ac66df

    SHA256

    331c98cef3112777df85fba3dab26fbd29b89a5897324b97f98ebaeafede7de1

    SHA512

    6f1edae28cd84b91b5fa72014b0ac5f12f15ab2dd6eee61cabab7aa53885ec8507e423c0e50c1806a427768603926988dce5ec11f29a86cf27bc099b02e78f1b

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    60fe01df86be2e5331b0cdbe86165686

    SHA1

    2a79f9713c3f192862ff80508062e64e8e0b29bd

    SHA256

    c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8

    SHA512

    ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\21CE7C7BFA208F88A7D16C35385EFE04

    Filesize

    503B

    MD5

    35e940fcd52c13cc2f65a2aa00cc7c9a

    SHA1

    866fac729acb1cd8e325f8fccbea8c1adbcb308a

    SHA256

    8e08a5de8912e6f519613f7565d9895a4a71a93183d41d472ad77c811ae63b0a

    SHA512

    5f2255b12422edab06b0d6e0b3e5f0a70bcacf6122f8f5f8dcfbd478329853e2e4bf9f11a5e48ae12548e7e943429330765d5291b5e860c70c08a5a8f0b1c3cd

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\51E90E8AC5A3699C401049C353FDC8AA

    Filesize

    503B

    MD5

    9e70f7fc7a282f7f1f59c6c1aa63ff55

    SHA1

    031ec6912c6d40f28e6c33f671b2180b36b00edc

    SHA256

    16aec5d9b2f82d24357232c9beec61bc3fbb98c586fde7a5b24dabc1c072cc20

    SHA512

    ea98c72e5ebebc5fdc588b0e7a60e4d62d6dade9229fa62729eaba9ae04e1077210249490182c6ccb6b399f9f6178486ba48daf6a551ed9b86d9e2d10f9d5898

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6C477416838352F36A9046F8726EE331

    Filesize

    503B

    MD5

    60ec083467680cc56b876b74dc171167

    SHA1

    0fb7731bb042c2e83b11aaa64cf3db492edb9979

    SHA256

    e6b3f54e67309b7155b80dc96b984dd346e5b783971d3242e443f26fc1f7aa11

    SHA512

    dbb48fa542bbb3cab388c0ae8a46fc965e7628817f8193e497b9c1f71244159932e636954ba18c9460c65f527f5098d32f477cbfe3c95dd919add9a5b8fee87b

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\DB134C988B567E7BB846A85986E4ED12

    Filesize

    503B

    MD5

    a7b5daef53fdff9c2dde8a8b41454536

    SHA1

    f7d6460d54c8efa9738979cbb1a3224b582952b6

    SHA256

    6dd9784045646bbae34bce424562bda596acbb049b44e301e230be5aacf62ac7

    SHA512

    07743f519e642540498df75d08db7c6c96d437eef6c2a45cca8003bb10d332c27b3b5db150b0765a35b18bfc2660ddca73afb94082ced2057898b8bc5fe2ec58

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    06db581557f99bbee76cf6a7c45b4b77

    SHA1

    287d45284ddd84cffb3f57676bb71fb586217e55

    SHA256

    3ea0e51226511d746a8516f98b4ad5ca13fc17ae6954d5914f6ff58a289e7de2

    SHA512

    ecbcfc89c5bc5ba1bd83bc6a56438f324b0f14c9990020804e01c984a0ba04f05f4e98386f9024588c3f9b83f9389e34b34333d57b932268d08b2d295c91c231

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\21CE7C7BFA208F88A7D16C35385EFE04

    Filesize

    548B

    MD5

    3e848bfcf6f3d9b9b35a575ce9d7a552

    SHA1

    09e4cd882df1614d6a7d44bb43dd50850f93c789

    SHA256

    019f4629eb768f9cb48354b6b0f440ab6048b9a593bc727bb1476065bff382ce

    SHA512

    00fd6731b30dab71f237a4aa3941992c417ae0f50d599b2c69d35ea5ca70e880b470c7cbed36655e649d2d79e11c581080779adcee23125e6c37779596392f78

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\51E90E8AC5A3699C401049C353FDC8AA

    Filesize

    548B

    MD5

    4375883fde1c531d999ab963ac73fd90

    SHA1

    f25d264ca21027edab5308b41ccc1d68af8ae3ab

    SHA256

    cf25b8db593fce13e976c3823a7455761ffe9c3ffe8510246f59d94424813615

    SHA512

    6b486809a69a2b8dcd670c9c4ccac131eb1877fbdd41505b5f0d4fee7ba85538fb0754cf2ae82280bb016cef38b0ff9ea566d5b79572792dedb6807e7159a1f9

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6C477416838352F36A9046F8726EE331

    Filesize

    552B

    MD5

    d8a2a1df135e6f32aa50729dbe2d84d4

    SHA1

    1b86dd8c192f3b8041a31460182bfbaac9a13608

    SHA256

    5d4e5fc33b4ae98899203885f7e5b132730e1a661dcce7451107025484edd594

    SHA512

    b647be95c40f298b77fb4e35550db98bb04f183536df3ade73ed4a4f75001d5de4ca891ed61ae8b371dc04796eb3e46cb28fb059e8e24898449f62e9b3fd81c3

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\DB134C988B567E7BB846A85986E4ED12

    Filesize

    552B

    MD5

    757f7a09eb0c0458e64b64528ba81a95

    SHA1

    fd6323c00cac2ba22b42d87a5aecc317f436a84a

    SHA256

    ff970cf7b2f7dda0e9b8090512dba06ef1d7921568b60490108e327d196d7d0b

    SHA512

    e22614dc2f1727580ca3a8c496c706d5c6d4b3afc2c8c94c87e5700def3c4ff1ff3509594393a7c7a049697a04596249bd491cc169e3c667a8decd16771ddd03

  • C:\Users\Admin\AppData\Local\Temp\Fluxus\Fluxus V7.exe

    Filesize

    2.9MB

    MD5

    9a75daf4d0c193193b7e0ac38fde5382

    SHA1

    22da0286430384889f3db0f5c56c72ebb577b0b0

    SHA256

    5bec4cee05762294b3dfe2cc4e26ef5f33aaceb4c1f1a0bc40c595f45a321665

    SHA512

    5274cf52c9086f0248d3298e3b1430451f1a960588cf4e4da3f8b927338fb520232edb056043b70f38031ee397bc0074705feb4a489066f63454fcb15b544bb8

  • C:\Users\Admin\AppData\Local\Temp\Fluxus\Fluxus V7.exe

    Filesize

    2.9MB

    MD5

    9a75daf4d0c193193b7e0ac38fde5382

    SHA1

    22da0286430384889f3db0f5c56c72ebb577b0b0

    SHA256

    5bec4cee05762294b3dfe2cc4e26ef5f33aaceb4c1f1a0bc40c595f45a321665

    SHA512

    5274cf52c9086f0248d3298e3b1430451f1a960588cf4e4da3f8b927338fb520232edb056043b70f38031ee397bc0074705feb4a489066f63454fcb15b544bb8

  • C:\Users\Admin\AppData\Local\Temp\Fluxus\bin\FluxusAuth.dll

    Filesize

    4.3MB

    MD5

    8b7c95c980646614b4fd21414e489be7

    SHA1

    19c4cfeb0a5c4d2d305022bb34e817d63c6d5f25

    SHA256

    9f766783ca687dc5b7718350b673bc895cb9b0eb7e9185ea0b8044867c2bbbfe

    SHA512

    8027b1036c6ccd18b5f51e95a5ab687c65766cf63d1e619da9c91dca16dbdc68b2d85acde13955f600d0a32a914b4fdb76912e7b1c00a10327835ad6882c402a

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_iho4oxjx.qs3.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • \Users\Admin\AppData\Local\Temp\Fluxus\bin\FluxusAuth.dll

    Filesize

    4.3MB

    MD5

    8b7c95c980646614b4fd21414e489be7

    SHA1

    19c4cfeb0a5c4d2d305022bb34e817d63c6d5f25

    SHA256

    9f766783ca687dc5b7718350b673bc895cb9b0eb7e9185ea0b8044867c2bbbfe

    SHA512

    8027b1036c6ccd18b5f51e95a5ab687c65766cf63d1e619da9c91dca16dbdc68b2d85acde13955f600d0a32a914b4fdb76912e7b1c00a10327835ad6882c402a

  • memory/800-118-0x00000216B99B0000-0x00000216B99B2000-memory.dmp

    Filesize

    8KB

  • memory/800-99-0x00000216BAF00000-0x00000216BAF10000-memory.dmp

    Filesize

    64KB

  • memory/3272-79-0x00000000736A0000-0x0000000073D8E000-memory.dmp

    Filesize

    6.9MB

  • memory/3272-31-0x00000000736A0000-0x0000000073D8E000-memory.dmp

    Filesize

    6.9MB

  • memory/3272-32-0x00000000FE5C0000-0x00000000FE5D0000-memory.dmp

    Filesize

    64KB

  • memory/3272-33-0x000000000FC20000-0x000000000FC3E000-memory.dmp

    Filesize

    120KB

  • memory/3272-34-0x000000000FC50000-0x000000000FCF5000-memory.dmp

    Filesize

    660KB

  • memory/3272-35-0x000000000FF40000-0x000000000FF5A000-memory.dmp

    Filesize

    104KB

  • memory/3272-36-0x000000000FF30000-0x000000000FF38000-memory.dmp

    Filesize

    32KB

  • memory/3272-37-0x000000000D9F0000-0x000000000D9F8000-memory.dmp

    Filesize

    32KB

  • memory/3272-38-0x0000000003490000-0x00000000034A0000-memory.dmp

    Filesize

    64KB

  • memory/3272-39-0x00000000FE5C0000-0x00000000FE5D0000-memory.dmp

    Filesize

    64KB

  • memory/3272-41-0x000000000A360000-0x000000000A36A000-memory.dmp

    Filesize

    40KB

  • memory/3272-42-0x000000000A390000-0x000000000A3A2000-memory.dmp

    Filesize

    72KB

  • memory/3272-0-0x00000000736A0000-0x0000000073D8E000-memory.dmp

    Filesize

    6.9MB

  • memory/3272-1-0x0000000000F70000-0x0000000001364000-memory.dmp

    Filesize

    4.0MB

  • memory/3272-22-0x000000000D5B0000-0x000000000D626000-memory.dmp

    Filesize

    472KB

  • memory/3272-2-0x0000000003490000-0x00000000034A0000-memory.dmp

    Filesize

    64KB

  • memory/3272-3-0x0000000003490000-0x00000000034A0000-memory.dmp

    Filesize

    64KB

  • memory/3272-4-0x00000000062D0000-0x00000000067CE000-memory.dmp

    Filesize

    5.0MB

  • memory/3272-21-0x000000000D4E0000-0x000000000D52B000-memory.dmp

    Filesize

    300KB

  • memory/3272-5-0x0000000005EB0000-0x0000000005F42000-memory.dmp

    Filesize

    584KB

  • memory/3272-20-0x000000000C900000-0x000000000C922000-memory.dmp

    Filesize

    136KB

  • memory/3272-19-0x000000000C860000-0x000000000C8C6000-memory.dmp

    Filesize

    408KB

  • memory/3272-6-0x000000000A5C0000-0x000000000A5C8000-memory.dmp

    Filesize

    32KB

  • memory/3272-7-0x0000000003490000-0x00000000034A0000-memory.dmp

    Filesize

    64KB

  • memory/3272-8-0x000000000A750000-0x000000000A788000-memory.dmp

    Filesize

    224KB

  • memory/3272-18-0x000000000D000000-0x000000000D350000-memory.dmp

    Filesize

    3.3MB

  • memory/3272-17-0x000000000C410000-0x000000000C45A000-memory.dmp

    Filesize

    296KB

  • memory/3272-9-0x000000000BCD0000-0x000000000C2F8000-memory.dmp

    Filesize

    6.2MB

  • memory/3272-10-0x000000000BB10000-0x000000000BB2A000-memory.dmp

    Filesize

    104KB

  • memory/3272-11-0x000000000BB70000-0x000000000BBA6000-memory.dmp

    Filesize

    216KB

  • memory/3272-12-0x000000000C980000-0x000000000CFF8000-memory.dmp

    Filesize

    6.5MB

  • memory/3272-13-0x000000000C300000-0x000000000C394000-memory.dmp

    Filesize

    592KB

  • memory/3272-14-0x000000000BC00000-0x000000000BC22000-memory.dmp

    Filesize

    136KB

  • memory/3272-15-0x000000000C3A0000-0x000000000C406000-memory.dmp

    Filesize

    408KB

  • memory/3272-16-0x000000000BC50000-0x000000000BC6C000-memory.dmp

    Filesize

    112KB

  • memory/4672-240-0x0000020778AB0000-0x0000020778AB2000-memory.dmp

    Filesize

    8KB

  • memory/4672-170-0x0000020778260000-0x0000020778262000-memory.dmp

    Filesize

    8KB

  • memory/4672-182-0x0000020778920000-0x0000020778922000-memory.dmp

    Filesize

    8KB

  • memory/4672-187-0x0000020778B70000-0x0000020778B72000-memory.dmp

    Filesize

    8KB

  • memory/4672-195-0x0000020778BF0000-0x0000020778BF2000-memory.dmp

    Filesize

    8KB

  • memory/4672-199-0x0000020778C10000-0x0000020778C12000-memory.dmp

    Filesize

    8KB

  • memory/4672-203-0x0000020778D70000-0x0000020778D72000-memory.dmp

    Filesize

    8KB

  • memory/4672-207-0x0000020778E60000-0x0000020778E62000-memory.dmp

    Filesize

    8KB

  • memory/4672-218-0x0000020778120000-0x0000020778122000-memory.dmp

    Filesize

    8KB

  • memory/4672-221-0x0000020778190000-0x0000020778192000-memory.dmp

    Filesize

    8KB

  • memory/4672-225-0x00000207781B0000-0x00000207781B2000-memory.dmp

    Filesize

    8KB

  • memory/4672-228-0x0000020778ED0000-0x0000020778ED2000-memory.dmp

    Filesize

    8KB

  • memory/4672-230-0x00000207797F0000-0x00000207797F2000-memory.dmp

    Filesize

    8KB

  • memory/4672-232-0x000002077A140000-0x000002077A142000-memory.dmp

    Filesize

    8KB

  • memory/4672-234-0x000002077A300000-0x000002077A302000-memory.dmp

    Filesize

    8KB

  • memory/4672-236-0x000002077A330000-0x000002077A333000-memory.dmp

    Filesize

    12KB

  • memory/4672-238-0x000002077A3D0000-0x000002077A3D8000-memory.dmp

    Filesize

    32KB

  • memory/4672-175-0x0000020778490000-0x0000020778492000-memory.dmp

    Filesize

    8KB

  • memory/4672-242-0x0000020778AD0000-0x0000020778AD2000-memory.dmp

    Filesize

    8KB

  • memory/4672-179-0x00000207787F0000-0x00000207787F2000-memory.dmp

    Filesize

    8KB

  • memory/4672-162-0x0000020778220000-0x0000020778222000-memory.dmp

    Filesize

    8KB

  • memory/4672-158-0x0000020778200000-0x0000020778202000-memory.dmp

    Filesize

    8KB

  • memory/4672-156-0x00000207785F0000-0x00000207786F0000-memory.dmp

    Filesize

    1024KB

  • memory/4672-155-0x0000020778DA0000-0x0000020778DC0000-memory.dmp

    Filesize

    128KB

  • memory/4672-152-0x0000020778D40000-0x0000020778D60000-memory.dmp

    Filesize

    128KB

  • memory/4672-151-0x0000020778900000-0x0000020778920000-memory.dmp

    Filesize

    128KB

  • memory/4696-141-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/4696-82-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/4696-81-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/4696-80-0x00000000736A0000-0x0000000073D8E000-memory.dmp

    Filesize

    6.9MB

  • memory/4696-77-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/4696-64-0x000000006A860000-0x000000006AF3E000-memory.dmp

    Filesize

    6.9MB

  • memory/4696-57-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/4696-56-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/4696-55-0x00000000736A0000-0x0000000073D8E000-memory.dmp

    Filesize

    6.9MB

  • memory/4696-54-0x0000000000320000-0x0000000000604000-memory.dmp

    Filesize

    2.9MB

  • memory/4696-611-0x00000000736A0000-0x0000000073D8E000-memory.dmp

    Filesize

    6.9MB