Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 20:17

General

  • Target

    FinalMom.exe

  • Size

    270KB

  • MD5

    4c048896f61c1fc598c9ec70adf6ee08

  • SHA1

    fb5468fe0894a4a7728b1a388bc08963cc760118

  • SHA256

    f213b6d73b6a7b3d90f4097e69689fa88fffe327690801ffb6992d659b981bf2

  • SHA512

    33652027fe457dd967dad1367510db1fd0eede4415dd86b64aea9d77425e7e061b60577811e4c5e79a6cf17cba33faa52c1780934079ed527efeb7846b1dc75c

  • SSDEEP

    6144:LGLRsWlWysINHL87yCwQx4Jw99aKGz5UBBkvVv+Iz3D5vxju7llbb9EE4N8cUMsG:LGLdlHL8W/QWJwiKluNmudUl99EE4N88

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Using powershell.exe command.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 50 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3928
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:5112
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Modifies firewall policy service
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4608
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          3⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:3264
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2856
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2244
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4900
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
        2⤵
          PID:2296
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          2⤵
            PID:1300
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:4588
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:5060
        • C:\Users\Admin\AppData\Local\Temp\FinalMom.exe
          "C:\Users\Admin\AppData\Local\Temp\FinalMom.exe"
          1⤵
          • Checks computer location settings
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4260
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::CurrentUser.OpenSubKey(\"Software\\Microsoft\\Windows\").GetValue($Null)).EntryPoint.Invoke(0,$Null)"
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4576
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::CurrentUser.OpenSubKey(\"Software\\Microsoft\\Windows\").GetValue($Null)).EntryPoint.Invoke(0,$Null)"
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1400
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::CurrentUser.OpenSubKey(\"Software\\Microsoft\\Windows\").GetValue($Null)).EntryPoint.Invoke(0,$Null)"
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4192
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::CurrentUser.OpenSubKey(\"Software\\Microsoft\\Windows\").GetValue($Null)).EntryPoint.Invoke(0,$Null)"
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4544
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::CurrentUser.OpenSubKey(\"Software\\Microsoft\\Windows\").GetValue($Null)).EntryPoint.Invoke(0,$Null)"
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5068
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::CurrentUser.OpenSubKey(\"Software\\Microsoft\\Windows\").GetValue($Null)).EntryPoint.Invoke(0,$Null)"
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2024
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::CurrentUser.OpenSubKey(\"Software\\Microsoft\\Windows\").GetValue($Null)).EntryPoint.Invoke(0,$Null)"
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2924
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::CurrentUser.OpenSubKey(\"Software\\Microsoft\\Windows\").GetValue($Null)).EntryPoint.Invoke(0,$Null)"
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3888
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::CurrentUser.OpenSubKey(\"Software\\Microsoft\\Windows\").GetValue($Null)).EntryPoint.Invoke(0,$Null)"
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1888
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8FBD.tmp.bat""
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:516
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2920
            • C:\Windows\SysWOW64\timeout.exe
              timeout 2
              3⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:4388
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:2312
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:5476
        • C:\Windows\system32\OpenWith.exe
          C:\Windows\system32\OpenWith.exe -Embedding
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:5788
        • C:\Windows\system32\OpenWith.exe
          C:\Windows\system32\OpenWith.exe -Embedding
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:5988
        • C:\Windows\system32\OpenWith.exe
          C:\Windows\system32\OpenWith.exe -Embedding
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:1232

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log

          Filesize

          609B

          MD5

          d12b2202c8663de63120a7239216f4c9

          SHA1

          f0263381d735e0d3a029378de06e6c49f386bb4f

          SHA256

          a1523cbbb1efe7eaed779caf6077a067519945accb1ab61a4c39323fffea6e5d

          SHA512

          942e728bb334cd3a7c634617c04cc2848124505a7a5b3f3081e5d46334e313b1f6fbf854e94d4f44dd51692c39cd19d239b15de3f0aa443ebd8d60db2868ab80

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          1KB

          MD5

          28854213fdaa59751b2b4cfe772289cc

          SHA1

          fa7058052780f4b856dc2d56b88163ed55deb6ab

          SHA256

          7c65fe71d47e0de69a15b95d1ee4b433c07a1d6f00f37dd32aee3666bb84a915

          SHA512

          1e2c928242bdef287b1e8afe8c37427cfd3b7a83c37d4e00e45bcbaa38c9b0bf96f869a062c9bc6bb58ecd36e687a69b21d5b07803e6615a9b632922c1c5ace4

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          1f1f637583e2841a8f1e45e212e8ce93

          SHA1

          563335a2750d03e974d33195a99bdf88f2e38bba

          SHA256

          5dc3da9dc6398beb48a4d4496e6481d942210b03f5e9a0351459064c14156e28

          SHA512

          4a0ec047e37cdabf46409cbfe29243b6b0fad38a1b1dcd44bf1f0488898f26ef7a661a414ab1420676991d2d036861d54372d1a52f44491f8e5835dbdcc97b77

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          787aea3159a2656b10b195b99938fe9f

          SHA1

          e425d777e5c29bfc2e27e286a8937fef67a2fe20

          SHA256

          aa894590855a94bbe8ed8f663d76b1b098a9dea466d2030efb17da7232f9f6e3

          SHA512

          49cccab3b7c41cdcabd1613e42fdc982135dacc0c22059edd169a4521aa816d2064d65b810e58a02dcaaa963c17692bc568341690ca2b4bef49f568c7b2697b7

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          c240e18e3ac5bea95098398f4df41dd5

          SHA1

          068432a01355bbea57c5e4138fe3411d839eaa3d

          SHA256

          ca775b8b451c891f51dc2a47983daa2b1ee8413b0e614c5d657732885a2384d9

          SHA512

          ab8b6da4ba180a061b155a36f4b8557917ea3d147d4a61662323e0e7a7fbfb0bf263cf73682908f4f6bd37b0449779d9bcfdac5521b1cdeb7c1c1011fe0c1083

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          f9cf152923f568bebf81516bbab5e61e

          SHA1

          79605d849340595a964cdf93ab42a27bfe6be52f

          SHA256

          ac372719a9daaed4f0de532978f5acab592c77d19fc737f77d705d81bacb265c

          SHA512

          f3ddaa04695d74596d54a204c0513752787a68f055dae78e62f837faf707642a528c525e2d3367d5cc00486143d12fdf2ac9e10ada3bbedd7d7663bfc16e3f13

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133664123656500540.txt

          Filesize

          74KB

          MD5

          7c4afcf94956ea096820e66c8ce96906

          SHA1

          7f48a067e4832f07da8709545b2e355396535fa3

          SHA256

          ba4e774ce4a1be298d6991d558c8ff7611abc836c506ba19e0e923bf27ecb240

          SHA512

          be5e4263c8fa76c64af22bcb1e981696768bb6645bd2754b356e098bde3244f34107b276574ad786c0a858ee29dbaa183fc03c6c7618f21212a28a2bf828591d

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hlijieah.ke1.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\tmp8FBD.tmp.bat

          Filesize

          168B

          MD5

          d91891c27df6a5845630d027ff709a04

          SHA1

          ce4808d767665350edefe3bb8d573af9ada2b981

          SHA256

          4d7e0dfa94bece69f8d91f37cc6fd59999c357d60bba86e65f4c611c89e75f4c

          SHA512

          bd1eec37a23e4b719c529bf0e823ca7269d7280e0d0bf3b9abb640e2ba6fe3750e25343f445204a233014d5398fa28327daef44874a8120659af5ad1215f38a8

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms

          Filesize

          7KB

          MD5

          41891130edfa72b47c2ead20830713d4

          SHA1

          00d8de325a926443b1276419cd4c3e5a9453bd3e

          SHA256

          1973ef16f6c5ccda0f8e62caa8820105940b783c681ea8c2922186b8add13f73

          SHA512

          65bb5e4ea5f479c0be2ea2cbe2562acb8dc8ddc6d2e2d288511b0d3422296ae09f46b9909a2423a6873cca8beb9e1c5106f973e9495647bcab4a76a4b1758d4d

        • C:\Windows\System32\drivers\etc\hosts

          Filesize

          2KB

          MD5

          d240f3c8f1dd3f1b7744fb0b4461f381

          SHA1

          d73516a7b1336b4a75b1d0d2345152ba81241b16

          SHA256

          f3bdaeeabe30cd6749ba5e1c3409835e6498ffbd1d973dd757d32d41b84fc55d

          SHA512

          a12f2e4c29c1db01b937fd9d2922445c97227038467dac3591cfb5a93f19dc095d1f34e0f4f8b2401334ac6dbd282e3250e5b01e1111536c240637acd7e2de2d

        • memory/1400-13-0x0000000074560000-0x0000000074D10000-memory.dmp

          Filesize

          7.7MB

        • memory/1400-14-0x0000000074560000-0x0000000074D10000-memory.dmp

          Filesize

          7.7MB

        • memory/1400-115-0x0000000074560000-0x0000000074D10000-memory.dmp

          Filesize

          7.7MB

        • memory/3264-182-0x0000000003100000-0x0000000003101000-memory.dmp

          Filesize

          4KB

        • memory/4260-12-0x0000000074560000-0x0000000074D10000-memory.dmp

          Filesize

          7.7MB

        • memory/4260-0-0x000000007456E000-0x000000007456F000-memory.dmp

          Filesize

          4KB

        • memory/4260-1-0x00000000007A0000-0x00000000007EC000-memory.dmp

          Filesize

          304KB

        • memory/4260-2-0x0000000002B40000-0x0000000002B46000-memory.dmp

          Filesize

          24KB

        • memory/4260-3-0x000000000A790000-0x000000000A7F6000-memory.dmp

          Filesize

          408KB

        • memory/4260-4-0x0000000074560000-0x0000000074D10000-memory.dmp

          Filesize

          7.7MB

        • memory/4576-6-0x0000000074560000-0x0000000074D10000-memory.dmp

          Filesize

          7.7MB

        • memory/4576-102-0x00000000060B0000-0x00000000060FC000-memory.dmp

          Filesize

          304KB

        • memory/4576-15-0x0000000074560000-0x0000000074D10000-memory.dmp

          Filesize

          7.7MB

        • memory/4576-16-0x0000000004EE0000-0x0000000004F02000-memory.dmp

          Filesize

          136KB

        • memory/4576-120-0x0000000074560000-0x0000000074D10000-memory.dmp

          Filesize

          7.7MB

        • memory/4576-5-0x00000000023B0000-0x00000000023E6000-memory.dmp

          Filesize

          216KB

        • memory/4576-17-0x0000000004F80000-0x0000000004FE6000-memory.dmp

          Filesize

          408KB

        • memory/4576-23-0x00000000056F0000-0x0000000005A44000-memory.dmp

          Filesize

          3.3MB

        • memory/4576-101-0x0000000005C80000-0x0000000005C9E000-memory.dmp

          Filesize

          120KB

        • memory/4576-10-0x0000000074560000-0x0000000074D10000-memory.dmp

          Filesize

          7.7MB

        • memory/4576-7-0x0000000005050000-0x0000000005678000-memory.dmp

          Filesize

          6.2MB

        • memory/4576-103-0x0000000005F90000-0x0000000005FE0000-memory.dmp

          Filesize

          320KB

        • memory/4608-110-0x0000000005890000-0x0000000005922000-memory.dmp

          Filesize

          584KB

        • memory/4608-179-0x00000000093D0000-0x000000000946C000-memory.dmp

          Filesize

          624KB

        • memory/4608-178-0x0000000008720000-0x000000000872A000-memory.dmp

          Filesize

          40KB

        • memory/4608-109-0x0000000005C60000-0x0000000006204000-memory.dmp

          Filesize

          5.6MB

        • memory/5112-104-0x0000000000400000-0x0000000000454000-memory.dmp

          Filesize

          336KB

        • memory/5476-185-0x0000025640700000-0x0000025640800000-memory.dmp

          Filesize

          1024KB

        • memory/5476-183-0x0000025640700000-0x0000025640800000-memory.dmp

          Filesize

          1024KB

        • memory/5476-188-0x0000025641840000-0x0000025641860000-memory.dmp

          Filesize

          128KB

        • memory/5476-218-0x0000025641800000-0x0000025641820000-memory.dmp

          Filesize

          128KB

        • memory/5476-219-0x0000025641C20000-0x0000025641C40000-memory.dmp

          Filesize

          128KB