Analysis

  • max time kernel
    1705s
  • max time network
    1709s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-06-2024 16:24

General

  • Target

    Bolbi.vbs

  • Size

    46KB

  • MD5

    99ec3237394257cb0b5c24affe458f48

  • SHA1

    5300e68423da9712280e601b51622c4b567a23a4

  • SHA256

    ec17f950f6ee9c0c237d93bc0b766aa6e2ab458c70320b534212043128177b51

  • SHA512

    af2394d18f672def6d5d7081def759093759205aac0390ca03591c58c15a02e463a68b583b6fc28ef1368922b4bd5f9072d570ee97a955250a478cdb093500cb

  • SSDEEP

    384:m71ThEgivcqpCghtpCAhDnVLri57VurlgRL1xCLI05ej+1DPpUo/i/vFCbWZkraB:m7BGV95hIG1/d49gsCDsl

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables RegEdit via registry modification 1 IoCs
  • Disables cmd.exe use via registry modification 1 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Possible privilege escalation attempt 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 35 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • System policy modification 1 TTPs 32 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Bolbi.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\Bolbi.vbs" /elevated
      2⤵
      • UAC bypass
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Checks computer location settings
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1860
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c C:\Users\Public\Ghostroot\KillDora.bat
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4692
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\RUNDLL32.EXE user32.dll, UpdatePerUserSystemParameters
          4⤵
            PID:1628
          • C:\Windows\system32\reg.exe
            reg delete "HKLM\System\CurrentControlSet\Control\SafeBoot\Minimal" /f
            4⤵
            • Impair Defenses: Safe Mode Boot
            PID:4032
          • C:\Windows\system32\reg.exe
            reg delete "HKLM\System\CurrentControlSet\Control\SafeBoot\Network" /f
            4⤵
              PID:2908
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im explorer.exe
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:824
            • C:\Windows\explorer.exe
              explorer.exe
              4⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Enumerates connected drives
              • Checks SCSI registry key(s)
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:4544
            • C:\Windows\system32\takeown.exe
              takeown /f C:\Windows\System32\
              4⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              • Suspicious use of AdjustPrivilegeToken
              PID:3892
            • C:\Windows\system32\icacls.exe
              icacls C:\Windows\System32 /Grant Users:F
              4⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              PID:1564
            • C:\Windows\system32\takeown.exe
              takeown /f C:\Windows\
              4⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              • Suspicious use of AdjustPrivilegeToken
              PID:4488
            • C:\Windows\system32\icacls.exe
              icacls C:\Windows\ /Grant Users:F
              4⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              PID:2276
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Bolbi.txt
        1⤵
        • Opens file in notepad (likely ransom note)
        PID:1372
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4372
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies registry class
        PID:2880
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4320
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3964
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4800
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3404
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3992
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SendNotifyMessage
        PID:1912
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4212
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4408
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:1324
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:2752
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:2776
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:2992
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3540
      • C:\Windows\system32\wscript.exe
        wscript.exe C:\Users\Public\ghostroot\Message.vbs explorer.exe
        1⤵
          PID:1680
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:4588

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Persistence

          Boot or Logon Autostart Execution

          2
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Active Setup

          1
          T1547.014

          Event Triggered Execution

          1
          T1546

          Image File Execution Options Injection

          1
          T1546.012

          Privilege Escalation

          Abuse Elevation Control Mechanism

          1
          T1548

          Bypass User Account Control

          1
          T1548.002

          Boot or Logon Autostart Execution

          2
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Active Setup

          1
          T1547.014

          Event Triggered Execution

          1
          T1546

          Image File Execution Options Injection

          1
          T1546.012

          Defense Evasion

          Abuse Elevation Control Mechanism

          1
          T1548

          Bypass User Account Control

          1
          T1548.002

          Impair Defenses

          2
          T1562

          Disable or Modify Tools

          1
          T1562.001

          Safe Mode Boot

          1
          T1562.009

          Modify Registry

          6
          T1112

          File and Directory Permissions Modification

          1
          T1222

          Discovery

          Query Registry

          4
          T1012

          System Information Discovery

          5
          T1082

          Peripheral Device Discovery

          2
          T1120

          Impact

          Defacement

          1
          T1491

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak
            Filesize

            9KB

            MD5

            7050d5ae8acfbe560fa11073fef8185d

            SHA1

            5bc38e77ff06785fe0aec5a345c4ccd15752560e

            SHA256

            cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

            SHA512

            a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres
            Filesize

            2KB

            MD5

            c56aed819b25463bb6fae8dc1c172255

            SHA1

            e5e5c222fe93d92c3dce287b0ba72c07022b29da

            SHA256

            30a575623393c195a4125209b8881f38c1d1aec4027179bed8a261b5f0744f35

            SHA512

            1b4299b192c30b73a32c287a2b0681ee7cdb5532f4ba7002eb65feda54785adb14d9be03f83a1a9861dd4218ec156a0ba5e0a7689794062a705a92b79f1a6313

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Office_SETLANG_EXE_15
            Filesize

            36KB

            MD5

            0e2a09c8b94747fa78ec836b5711c0c0

            SHA1

            92495421ad887f27f53784c470884802797025ad

            SHA256

            0c1cdbbf6d974764aad46477863059eaec7b1717a7d26b025f0f8fe24338bb36

            SHA512

            61530a33a6109467962ba51371821ea55bb36cd2abc0e7a15f270abf62340e9166e66a1b10f4de9a306b368820802c4adb9653b9a5acd6f1e825e60128fd2409

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_Explorer
            Filesize

            36KB

            MD5

            ab0262f72142aab53d5402e6d0cb5d24

            SHA1

            eaf95bb31ae1d4c0010f50e789bdc8b8e3116116

            SHA256

            20a108577209b2499cfdba77645477dd0d9771a77d42a53c6315156761efcfbb

            SHA512

            bf9580f3e5d1102cf758503e18a2cf98c799c4a252eedf9344f7c5626da3a1cf141353f01601a3b549234cc3f2978ad31f928068395b56f9f0885c07dbe81da1

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133638062918839050.txt
            Filesize

            75KB

            MD5

            834cee2ff3995f35fbb665ec8aed11f0

            SHA1

            0fa7cf57b388d8b64fc2db9aa68cd4ea3e0439b7

            SHA256

            3bb947f50b5747419e539878fc44f75bc7b70b23749ad64410db9ba9805cfb53

            SHA512

            78a275b6c4a6b9d6279417ff378a787aaec144b3d4bdd444beffafe5941223ca78a775ad33444ddd731e054a5dbeb63a9eda289ff074a586c2b08b324acad552

          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DEN9315F\microsoft.windows[1].xml
            Filesize

            97B

            MD5

            874407164075f430e90aef3f5424206b

            SHA1

            8575db62a2f0eeec19bd607b8d7ae7fe170d440c

            SHA256

            bb832ca543f384639184651203cbc6376ad386b418d3777dd54c4680b7051a8a

            SHA512

            8bf5fda5ffe2962a35ae23ad32664fe7ea3315870f51e196aff13d28bf07fd54012161de236f5a88fd2d2acb4a7efd35fd3392730b6dd568ab2df7092ba897d7

          • C:\Users\Admin\Desktop\Bolbi.txt
            Filesize

            29B

            MD5

            b37ed35ef479e43f406429bc36e68ec4

            SHA1

            5e3ec88d9d13d136af28dea0d3c2529f5b6e3b82

            SHA256

            cc2b26f9e750e05cd680ef5721d9269fe4c8d23cabf500a2ff9065b6b4f7e08c

            SHA512

            d1c1ea6292d8113ce8f02a9ad3921e2d8632f036bdfa243bd6600a173ac0b1fc659f91b43c8d9ec0beaabb87d9654f5f231e98fde27e4d9bdfd5862ca5cb13b7

          • C:\Users\Admin\Music\Slap1.vbs
            Filesize

            46KB

            MD5

            99ec3237394257cb0b5c24affe458f48

            SHA1

            5300e68423da9712280e601b51622c4b567a23a4

            SHA256

            ec17f950f6ee9c0c237d93bc0b766aa6e2ab458c70320b534212043128177b51

            SHA512

            af2394d18f672def6d5d7081def759093759205aac0390ca03591c58c15a02e463a68b583b6fc28ef1368922b4bd5f9072d570ee97a955250a478cdb093500cb

          • C:\Users\Public\Ghostroot\KillDora.bat
            Filesize

            482B

            MD5

            4f08159f1d70d41bf975e23230033a0f

            SHA1

            ea88d6fbdcf218e0e04a650d947250d8a3dfad40

            SHA256

            d6e7530e3879225bc21fc17859e5b5c71414375baac27bb361fd9162f4b49e0e

            SHA512

            958ac467e54d35c4ca5459853d661e49ea81efaa1ce3044114d577fcb757343a40ddb30b9f540cf9c100f05958a843bf312fa879c43bda7513643c824b318d6a

          • C:\Users\Public\ghostroot\Message.vbs
            Filesize

            55B

            MD5

            302e08c86880a39ca55f21cabfa7c5de

            SHA1

            58d56c0eb14fc0401cda7c48d6df9d23f6e9b7e3

            SHA256

            65cfb12baaa6f5891bcd7fda727933a4a12f6dbfa9a6717549eacc6dee9436c7

            SHA512

            9aac68a57cea3d00b956ff82ce443600a969dbc3e4eb2b7b12902f70e318c7dbbf7378b375dd28c0d3be0a0515c5c69d4dd5610d5778f22c4e33765d704f8ff7

          • memory/1860-347506-0x0000029D02670000-0x0000029D02680000-memory.dmp
            Filesize

            64KB

          • memory/1860-347507-0x0000029D02670000-0x0000029D02680000-memory.dmp
            Filesize

            64KB

          • memory/1860-347508-0x0000029D02670000-0x0000029D02680000-memory.dmp
            Filesize

            64KB

          • memory/1860-347502-0x0000029D02670000-0x0000029D02680000-memory.dmp
            Filesize

            64KB

          • memory/1860-347505-0x0000029D02670000-0x0000029D02680000-memory.dmp
            Filesize

            64KB

          • memory/1860-347504-0x0000029D02670000-0x0000029D02680000-memory.dmp
            Filesize

            64KB

          • memory/1860-347503-0x0000029D02670000-0x0000029D02680000-memory.dmp
            Filesize

            64KB

          • memory/1860-347509-0x0000029D02670000-0x0000029D02680000-memory.dmp
            Filesize

            64KB

          • memory/1860-347510-0x0000029D02670000-0x0000029D02680000-memory.dmp
            Filesize

            64KB

          • memory/1912-168-0x0000000004C80000-0x0000000004C81000-memory.dmp
            Filesize

            4KB

          • memory/2776-319-0x0000000004610000-0x0000000004611000-memory.dmp
            Filesize

            4KB

          • memory/3540-327-0x000001E3BB4A0000-0x000001E3BB4C0000-memory.dmp
            Filesize

            128KB

          • memory/3540-358-0x000001E3BBA80000-0x000001E3BBAA0000-memory.dmp
            Filesize

            128KB

          • memory/3540-357-0x000001E3BB460000-0x000001E3BB480000-memory.dmp
            Filesize

            128KB

          • memory/3540-321-0x000001E3BA600000-0x000001E3BA700000-memory.dmp
            Filesize

            1024KB

          • memory/3540-322-0x000001E3BA600000-0x000001E3BA700000-memory.dmp
            Filesize

            1024KB

          • memory/3992-58-0x0000024782EA0000-0x0000024782EC0000-memory.dmp
            Filesize

            128KB

          • memory/3992-42-0x0000024782890000-0x00000247828B0000-memory.dmp
            Filesize

            128KB

          • memory/3992-23-0x0000024781900000-0x0000024781A00000-memory.dmp
            Filesize

            1024KB

          • memory/3992-27-0x00000247828D0000-0x00000247828F0000-memory.dmp
            Filesize

            128KB

          • memory/3992-24-0x0000024781900000-0x0000024781A00000-memory.dmp
            Filesize

            1024KB

          • memory/4408-183-0x0000018C630B0000-0x0000018C630D0000-memory.dmp
            Filesize

            128KB

          • memory/4408-169-0x0000018C62000000-0x0000018C62100000-memory.dmp
            Filesize

            1024KB

          • memory/4408-174-0x0000018C630F0000-0x0000018C63110000-memory.dmp
            Filesize

            128KB

          • memory/4408-171-0x0000018C62000000-0x0000018C62100000-memory.dmp
            Filesize

            1024KB

          • memory/4408-196-0x0000018C634C0000-0x0000018C634E0000-memory.dmp
            Filesize

            128KB

          • memory/4800-20-0x0000000004550000-0x0000000004551000-memory.dmp
            Filesize

            4KB