Analysis

  • max time kernel
    17s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-06-2023 22:56

General

  • Target

    BruteForcers PACK/BruteForcers PACK/Psn Bruteforcer & Checker/PSN_Bruteforce.exe

  • Size

    266KB

  • MD5

    48d75f6251f7561a68c29f0ae7d4f5c4

  • SHA1

    e7efee7e433c3670850ca226a681995b40beb36d

  • SHA256

    5412dfada3098e650be47040dde745bd785b898eb0f053f547eb89a345275663

  • SHA512

    956d5023c70f3af39f5fba0482461a5ce65221b08ced2cec4af6f64fa5e15a8ddae94b1ecd3f763575657a0b0b7b619abaa4cf7f783578ee1e0d8a7353b4518f

  • SSDEEP

    6144:M658iATgA5TdzOg1eul7WlBxFAKEfhr1XaIqL7ym0v:CThO3siDH6fhgIqqmq

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\PSN_Bruteforce.exe
    "C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\PSN_Bruteforce.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\db\Launcher.exe
      "C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\db\Launcher.exe"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4968
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath C:\Windows\IMF\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1436
      • C:\Windows\IMF\Windows Services.exe
        "C:\Windows\IMF\Windows Services.exe" {Arguments If Needed}
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3828
        • C:\Windows\IMF\Secure System Shell.exe
          "C:\Windows\IMF\Secure System Shell.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1724
        • C:\Windows\IMF\Runtime Explorer.exe
          "C:\Windows\IMF\Runtime Explorer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4276
    • C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\db\psnsys.exe
      "C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\db\psnsys.exe"
      2⤵
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:628
      • C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\._cache_psnsys.exe
        "C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\._cache_psnsys.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2648
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\._cache_Synaptics.exe
          "C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\._cache_Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2464
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4668

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    3.7MB

    MD5

    31e3b489d670036cd0fea9834b0fbf5f

    SHA1

    d9ff3ac6c9e215a192305b4f12f67bddd2b69736

    SHA256

    c7b29fc23d74d53922803f29d1c96edb3c5ea77144eacdd00d0fdb9fe243ff23

    SHA512

    bc9d1fc3cb100aa4d542c9690288b3ee8ed65c464918ff99a697ffe9fb21c21c4f8ed5100fb133ab77b506c152e3cf624e69f5ee6b4cd3d23c8a4b335ffdd14a

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    3.7MB

    MD5

    31e3b489d670036cd0fea9834b0fbf5f

    SHA1

    d9ff3ac6c9e215a192305b4f12f67bddd2b69736

    SHA256

    c7b29fc23d74d53922803f29d1c96edb3c5ea77144eacdd00d0fdb9fe243ff23

    SHA512

    bc9d1fc3cb100aa4d542c9690288b3ee8ed65c464918ff99a697ffe9fb21c21c4f8ed5100fb133ab77b506c152e3cf624e69f5ee6b4cd3d23c8a4b335ffdd14a

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    3.7MB

    MD5

    31e3b489d670036cd0fea9834b0fbf5f

    SHA1

    d9ff3ac6c9e215a192305b4f12f67bddd2b69736

    SHA256

    c7b29fc23d74d53922803f29d1c96edb3c5ea77144eacdd00d0fdb9fe243ff23

    SHA512

    bc9d1fc3cb100aa4d542c9690288b3ee8ed65c464918ff99a697ffe9fb21c21c4f8ed5100fb133ab77b506c152e3cf624e69f5ee6b4cd3d23c8a4b335ffdd14a

  • C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\._cache_Synaptics.exe

    Filesize

    3.0MB

    MD5

    7be8282cc61bb2c2738a3a0bce2d13f3

    SHA1

    dce913a73d1abe023ed965ee8b6f57feef73c29b

    SHA256

    bc61c39d5257e2833f5ccd65a4e25aedc7ba4b0180cd4e466d93fe738ce7e077

    SHA512

    15a1fd62e24a210972d8341affd4c89912cb3463b01587b526786e44fbf7d0aa12ab5e4ea8140e5d9aae8159170ee45cac38cd1130b5f0a19ad3285d926e50f5

  • C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\._cache_psnsys.exe

    Filesize

    3.0MB

    MD5

    7be8282cc61bb2c2738a3a0bce2d13f3

    SHA1

    dce913a73d1abe023ed965ee8b6f57feef73c29b

    SHA256

    bc61c39d5257e2833f5ccd65a4e25aedc7ba4b0180cd4e466d93fe738ce7e077

    SHA512

    15a1fd62e24a210972d8341affd4c89912cb3463b01587b526786e44fbf7d0aa12ab5e4ea8140e5d9aae8159170ee45cac38cd1130b5f0a19ad3285d926e50f5

  • C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\._cache_psnsys.exe

    Filesize

    3.0MB

    MD5

    7be8282cc61bb2c2738a3a0bce2d13f3

    SHA1

    dce913a73d1abe023ed965ee8b6f57feef73c29b

    SHA256

    bc61c39d5257e2833f5ccd65a4e25aedc7ba4b0180cd4e466d93fe738ce7e077

    SHA512

    15a1fd62e24a210972d8341affd4c89912cb3463b01587b526786e44fbf7d0aa12ab5e4ea8140e5d9aae8159170ee45cac38cd1130b5f0a19ad3285d926e50f5

  • C:\Users\Admin\AppData\Local\Temp\BruteForcers PACK\BruteForcers PACK\Psn Bruteforcer & Checker\Data.json

    Filesize

    98B

    MD5

    09e77dc64ac6132aeafba967f89fb7ea

    SHA1

    ac4a111fbe9baf882e0e95decf3f99729782ed04

    SHA256

    a205a1feffa0852cbe2cc72c96f52d09a631eb43d3a8d1b65c4fb76576375a3e

    SHA512

    3dc1b71ab11099054170b5f812742f2fe398490a44c6bb185d9076fc36aaa7d66d784775b6bbf9e8a3dbd4af8a53d5fce7809f4f4ad9a3cb23f34dab653f2213

  • C:\Users\Admin\AppData\Local\Temp\TAYsJasv.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2xkndcas.rgd.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Windows\IMF\Runtime Explorer.exe

    Filesize

    144KB

    MD5

    ec70c6f4dc443c5ab2b91d64ae04fa8e

    SHA1

    43eb3b3289782fced204f0b4e3edad2ba1b085b7

    SHA256

    276f1bfc6256f4c1ddd544d5a556d299ebddcf200a64ee7c9c3edef686df727d

    SHA512

    6217c232edbcf60ae1337120aa9b51956e06f591c660fd720b02fe8abf01923dd4dca28f69ece88c12c705a4c3a392d0cbb6f4f6c6759306123db141ed05d584

  • C:\Windows\IMF\Runtime Explorer.exe

    Filesize

    144KB

    MD5

    ec70c6f4dc443c5ab2b91d64ae04fa8e

    SHA1

    43eb3b3289782fced204f0b4e3edad2ba1b085b7

    SHA256

    276f1bfc6256f4c1ddd544d5a556d299ebddcf200a64ee7c9c3edef686df727d

    SHA512

    6217c232edbcf60ae1337120aa9b51956e06f591c660fd720b02fe8abf01923dd4dca28f69ece88c12c705a4c3a392d0cbb6f4f6c6759306123db141ed05d584

  • C:\Windows\IMF\Runtime Explorer.exe

    Filesize

    144KB

    MD5

    ec70c6f4dc443c5ab2b91d64ae04fa8e

    SHA1

    43eb3b3289782fced204f0b4e3edad2ba1b085b7

    SHA256

    276f1bfc6256f4c1ddd544d5a556d299ebddcf200a64ee7c9c3edef686df727d

    SHA512

    6217c232edbcf60ae1337120aa9b51956e06f591c660fd720b02fe8abf01923dd4dca28f69ece88c12c705a4c3a392d0cbb6f4f6c6759306123db141ed05d584

  • C:\Windows\IMF\Secure System Shell.exe

    Filesize

    45KB

    MD5

    7d0c7359e5b2daa5665d01afdc98cc00

    SHA1

    c3cc830c8ffd0f53f28d89dcd9f3426be87085cb

    SHA256

    f1abd5ab03189e82971513e6ca04bd372fcf234d670079888f01cf4addd49809

    SHA512

    a8f82b11b045d8dd744506f4f56f3382b33a03684a6aebc91a02ea901c101b91cb43b7d0213f72f39cbb22f616ecd5de8b9e6c99fb5669f26a3ea6bcb63c8407

  • C:\Windows\IMF\Secure System Shell.exe

    Filesize

    45KB

    MD5

    7d0c7359e5b2daa5665d01afdc98cc00

    SHA1

    c3cc830c8ffd0f53f28d89dcd9f3426be87085cb

    SHA256

    f1abd5ab03189e82971513e6ca04bd372fcf234d670079888f01cf4addd49809

    SHA512

    a8f82b11b045d8dd744506f4f56f3382b33a03684a6aebc91a02ea901c101b91cb43b7d0213f72f39cbb22f616ecd5de8b9e6c99fb5669f26a3ea6bcb63c8407

  • C:\Windows\IMF\Secure System Shell.exe

    Filesize

    45KB

    MD5

    7d0c7359e5b2daa5665d01afdc98cc00

    SHA1

    c3cc830c8ffd0f53f28d89dcd9f3426be87085cb

    SHA256

    f1abd5ab03189e82971513e6ca04bd372fcf234d670079888f01cf4addd49809

    SHA512

    a8f82b11b045d8dd744506f4f56f3382b33a03684a6aebc91a02ea901c101b91cb43b7d0213f72f39cbb22f616ecd5de8b9e6c99fb5669f26a3ea6bcb63c8407

  • C:\Windows\IMF\Windows Services.exe

    Filesize

    46KB

    MD5

    ad0ce1302147fbdfecaec58480eb9cf9

    SHA1

    874efbc76e5f91bc1425a43ea19400340f98d42b

    SHA256

    2c339b52b82e73b4698a0110cdfe310c00c5c69078e9e1bd6fa1308652bf82a3

    SHA512

    adccd5520e01b673c2fc5c451305fe31b1a3e74891aece558f75fefc50218adf1fb81bb8c7f19969929d3fecb0fdb2cb5b564400d51e0a5a1ad8d5bc2d4eed53

  • C:\Windows\IMF\Windows Services.exe

    Filesize

    46KB

    MD5

    ad0ce1302147fbdfecaec58480eb9cf9

    SHA1

    874efbc76e5f91bc1425a43ea19400340f98d42b

    SHA256

    2c339b52b82e73b4698a0110cdfe310c00c5c69078e9e1bd6fa1308652bf82a3

    SHA512

    adccd5520e01b673c2fc5c451305fe31b1a3e74891aece558f75fefc50218adf1fb81bb8c7f19969929d3fecb0fdb2cb5b564400d51e0a5a1ad8d5bc2d4eed53

  • C:\Windows\IMF\Windows Services.exe

    Filesize

    46KB

    MD5

    ad0ce1302147fbdfecaec58480eb9cf9

    SHA1

    874efbc76e5f91bc1425a43ea19400340f98d42b

    SHA256

    2c339b52b82e73b4698a0110cdfe310c00c5c69078e9e1bd6fa1308652bf82a3

    SHA512

    adccd5520e01b673c2fc5c451305fe31b1a3e74891aece558f75fefc50218adf1fb81bb8c7f19969929d3fecb0fdb2cb5b564400d51e0a5a1ad8d5bc2d4eed53

  • memory/628-145-0x0000000002530000-0x0000000002531000-memory.dmp

    Filesize

    4KB

  • memory/628-333-0x0000000000400000-0x00000000007B7000-memory.dmp

    Filesize

    3.7MB

  • memory/1436-415-0x0000000007CB0000-0x0000000007CCA000-memory.dmp

    Filesize

    104KB

  • memory/1436-149-0x0000000005B40000-0x0000000006168000-memory.dmp

    Filesize

    6.2MB

  • memory/1436-163-0x0000000003170000-0x0000000003180000-memory.dmp

    Filesize

    64KB

  • memory/1436-157-0x0000000006350000-0x00000000063B6000-memory.dmp

    Filesize

    408KB

  • memory/1436-414-0x0000000008300000-0x000000000897A000-memory.dmp

    Filesize

    6.5MB

  • memory/1436-234-0x0000000006990000-0x00000000069AE000-memory.dmp

    Filesize

    120KB

  • memory/1436-406-0x000000007F040000-0x000000007F050000-memory.dmp

    Filesize

    64KB

  • memory/1436-156-0x00000000062E0000-0x0000000006346000-memory.dmp

    Filesize

    408KB

  • memory/1436-150-0x0000000005AE0000-0x0000000005B02000-memory.dmp

    Filesize

    136KB

  • memory/1436-392-0x0000000006F90000-0x0000000006FC2000-memory.dmp

    Filesize

    200KB

  • memory/1436-403-0x0000000006F70000-0x0000000006F8E000-memory.dmp

    Filesize

    120KB

  • memory/1436-164-0x0000000003170000-0x0000000003180000-memory.dmp

    Filesize

    64KB

  • memory/1436-146-0x00000000030B0000-0x00000000030E6000-memory.dmp

    Filesize

    216KB

  • memory/1436-336-0x0000000003170000-0x0000000003180000-memory.dmp

    Filesize

    64KB

  • memory/1436-421-0x0000000007D20000-0x0000000007D2A000-memory.dmp

    Filesize

    40KB

  • memory/1436-422-0x0000000007F30000-0x0000000007FC6000-memory.dmp

    Filesize

    600KB

  • memory/1436-425-0x0000000007EE0000-0x0000000007EEE000-memory.dmp

    Filesize

    56KB

  • memory/1436-426-0x0000000007FF0000-0x000000000800A000-memory.dmp

    Filesize

    104KB

  • memory/1436-427-0x0000000007FD0000-0x0000000007FD8000-memory.dmp

    Filesize

    32KB

  • memory/1436-393-0x000000006E990000-0x000000006E9DC000-memory.dmp

    Filesize

    304KB

  • memory/1724-332-0x0000000000DE0000-0x0000000000DF2000-memory.dmp

    Filesize

    72KB

  • memory/1724-405-0x00000000056F0000-0x0000000005700000-memory.dmp

    Filesize

    64KB

  • memory/1724-459-0x00000000056F0000-0x0000000005700000-memory.dmp

    Filesize

    64KB

  • memory/2464-423-0x0000000001070000-0x0000000001071000-memory.dmp

    Filesize

    4KB

  • memory/2464-420-0x000000006EE10000-0x000000006EE1C000-memory.dmp

    Filesize

    48KB

  • memory/2464-460-0x00000000027D0000-0x00000000027E0000-memory.dmp

    Filesize

    64KB

  • memory/2464-457-0x0000000000400000-0x0000000000702000-memory.dmp

    Filesize

    3.0MB

  • memory/2464-424-0x00000000027D0000-0x00000000027E0000-memory.dmp

    Filesize

    64KB

  • memory/2536-135-0x0000000005C70000-0x0000000006214000-memory.dmp

    Filesize

    5.6MB

  • memory/2536-139-0x00000000058A0000-0x00000000058B0000-memory.dmp

    Filesize

    64KB

  • memory/2536-136-0x0000000005760000-0x00000000057F2000-memory.dmp

    Filesize

    584KB

  • memory/2536-137-0x00000000056C0000-0x00000000056CA000-memory.dmp

    Filesize

    40KB

  • memory/2536-134-0x0000000005620000-0x00000000056BC000-memory.dmp

    Filesize

    624KB

  • memory/2536-138-0x0000000005800000-0x0000000005856000-memory.dmp

    Filesize

    344KB

  • memory/2536-133-0x0000000000C10000-0x0000000000C58000-memory.dmp

    Filesize

    288KB

  • memory/2648-451-0x00000000009F0000-0x00000000009F1000-memory.dmp

    Filesize

    4KB

  • memory/2648-335-0x000000006EE10000-0x000000006EE1C000-memory.dmp

    Filesize

    48KB

  • memory/2648-456-0x0000000002A70000-0x0000000002A80000-memory.dmp

    Filesize

    64KB

  • memory/2648-338-0x00000000009F0000-0x00000000009F1000-memory.dmp

    Filesize

    4KB

  • memory/2648-337-0x00000000070D0000-0x000000000733E000-memory.dmp

    Filesize

    2.4MB

  • memory/2648-342-0x0000000002A70000-0x0000000002A80000-memory.dmp

    Filesize

    64KB

  • memory/2648-448-0x0000000000400000-0x0000000000702000-memory.dmp

    Filesize

    3.0MB

  • memory/3040-458-0x00000000022F0000-0x00000000022F1000-memory.dmp

    Filesize

    4KB

  • memory/3040-404-0x00000000022F0000-0x00000000022F1000-memory.dmp

    Filesize

    4KB

  • memory/3040-449-0x0000000000400000-0x00000000007B7000-memory.dmp

    Filesize

    3.7MB

  • memory/3828-259-0x0000000005520000-0x0000000005530000-memory.dmp

    Filesize

    64KB

  • memory/3828-250-0x0000000000B30000-0x0000000000B42000-memory.dmp

    Filesize

    72KB

  • memory/3828-450-0x0000000005520000-0x0000000005530000-memory.dmp

    Filesize

    64KB

  • memory/4668-431-0x00007FFADDEF0000-0x00007FFADDF00000-memory.dmp

    Filesize

    64KB

  • memory/4668-435-0x00007FFADBCF0000-0x00007FFADBD00000-memory.dmp

    Filesize

    64KB

  • memory/4668-436-0x00007FFADBCF0000-0x00007FFADBD00000-memory.dmp

    Filesize

    64KB

  • memory/4668-434-0x00007FFADDEF0000-0x00007FFADDF00000-memory.dmp

    Filesize

    64KB

  • memory/4668-433-0x00007FFADDEF0000-0x00007FFADDF00000-memory.dmp

    Filesize

    64KB

  • memory/4668-432-0x00007FFADDEF0000-0x00007FFADDF00000-memory.dmp

    Filesize

    64KB

  • memory/4668-429-0x00007FFADDEF0000-0x00007FFADDF00000-memory.dmp

    Filesize

    64KB

  • memory/4968-140-0x00000000002D0000-0x00000000002E4000-memory.dmp

    Filesize

    80KB

  • memory/4968-141-0x0000000006230000-0x00000000062AE000-memory.dmp

    Filesize

    504KB

  • memory/4968-143-0x0000000004B50000-0x0000000004B60000-memory.dmp

    Filesize

    64KB

  • memory/4968-142-0x0000000004B50000-0x0000000004B60000-memory.dmp

    Filesize

    64KB

  • memory/4968-233-0x0000000005E90000-0x0000000005F06000-memory.dmp

    Filesize

    472KB

  • memory/4968-235-0x0000000005E70000-0x0000000005E8E000-memory.dmp

    Filesize

    120KB