Analysis
-
max time kernel
9s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-04-2023 06:49
Behavioral task
behavioral1
Sample
blitzed.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
blitzed.exe
Resource
win10v2004-20230220-en
General
-
Target
blitzed.exe
-
Size
34.0MB
-
MD5
677514f05118d9b3cd0e0c4eb4f26087
-
SHA1
c3883d160a7ceca9d2d441c6720370d510ed5b43
-
SHA256
abeaa67ebce8e8b6d406834c8d016567e5d5bf4e1d2209a45a96c300828b8ef8
-
SHA512
cfda4d80b541de89046b2678ee52f2df8ef7a9308da8ea74a4d071f9f7e0f1bbba202210f84e74a5d6d4a1653b4bfa4ab2a2a12b093b591182c8746ba801bd00
-
SSDEEP
393216:kjfeZBR3LD34p21mu7L/FD/ftnSyY+k4tO2dQ2lN/m3pW+9J8eHzD8YVQJdGd8v:OoP3LEpOmCLtTtY4tndQGK19J8eHnKh
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
BLITZEDGRABBERV12.EXEORACLE.EXERECOVERY.EXERECOVERY.EXEpid process 904 BLITZEDGRABBERV12.EXE 520 ORACLE.EXE 1684 RECOVERY.EXE 1108 RECOVERY.EXE 1372 -
Loads dropped DLL 7 IoCs
Processes:
blitzed.exeRECOVERY.EXERECOVERY.EXEBLITZEDGRABBERV12.EXEpid process 1888 blitzed.exe 1888 blitzed.exe 1888 blitzed.exe 1888 blitzed.exe 1684 RECOVERY.EXE 1108 RECOVERY.EXE 904 BLITZEDGRABBERV12.EXE -
Obfuscated with Agile.Net obfuscator 34 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/904-185-0x0000000005200000-0x00000000053F2000-memory.dmp agile_net behavioral1/memory/904-194-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-195-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-197-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-199-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-201-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-206-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-208-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-203-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-210-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-212-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-214-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-216-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-218-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-220-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-222-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-225-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-227-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-229-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-233-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-235-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-237-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-231-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-239-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-241-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-243-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-245-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-247-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-249-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-251-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-253-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-255-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-257-0x0000000005200000-0x00000000053EE000-memory.dmp agile_net behavioral1/memory/904-1048-0x0000000004B60000-0x0000000004BA0000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ORACLE.EXE" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Detects Pyinstaller 6 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\RECOVERY.EXE pyinstaller C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE pyinstaller C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE pyinstaller \Users\Admin\AppData\Local\Temp\RECOVERY.EXE pyinstaller C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE pyinstaller \Users\Admin\AppData\Local\Temp\RECOVERY.EXE pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
blitzed.exeRECOVERY.EXEORACLE.EXEcmd.exedescription pid process target process PID 1888 wrote to memory of 904 1888 blitzed.exe BLITZEDGRABBERV12.EXE PID 1888 wrote to memory of 904 1888 blitzed.exe BLITZEDGRABBERV12.EXE PID 1888 wrote to memory of 904 1888 blitzed.exe BLITZEDGRABBERV12.EXE PID 1888 wrote to memory of 904 1888 blitzed.exe BLITZEDGRABBERV12.EXE PID 1888 wrote to memory of 520 1888 blitzed.exe ORACLE.EXE PID 1888 wrote to memory of 520 1888 blitzed.exe ORACLE.EXE PID 1888 wrote to memory of 520 1888 blitzed.exe ORACLE.EXE PID 1888 wrote to memory of 520 1888 blitzed.exe ORACLE.EXE PID 1888 wrote to memory of 1684 1888 blitzed.exe RECOVERY.EXE PID 1888 wrote to memory of 1684 1888 blitzed.exe RECOVERY.EXE PID 1888 wrote to memory of 1684 1888 blitzed.exe RECOVERY.EXE PID 1888 wrote to memory of 1684 1888 blitzed.exe RECOVERY.EXE PID 1684 wrote to memory of 1108 1684 RECOVERY.EXE RECOVERY.EXE PID 1684 wrote to memory of 1108 1684 RECOVERY.EXE RECOVERY.EXE PID 1684 wrote to memory of 1108 1684 RECOVERY.EXE RECOVERY.EXE PID 520 wrote to memory of 1720 520 ORACLE.EXE cmd.exe PID 520 wrote to memory of 1720 520 ORACLE.EXE cmd.exe PID 520 wrote to memory of 1720 520 ORACLE.EXE cmd.exe PID 1720 wrote to memory of 1352 1720 cmd.exe reg.exe PID 1720 wrote to memory of 1352 1720 cmd.exe reg.exe PID 1720 wrote to memory of 1352 1720 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\blitzed.exe"C:\Users\Admin\AppData\Local\Temp\blitzed.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\ORACLE.EXE"C:\Users\Admin\AppData\Local\Temp\ORACLE.EXE"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /C "REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V WindowsUpdate /t REG_SZ /F /D C:\Users\Admin\AppData\Local\Temp\ORACLE.EXE"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V WindowsUpdate /t REG_SZ /F /D C:\Users\Admin\AppData\Local\Temp\ORACLE.EXE4⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE"C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE"C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXEFilesize
1.6MB
MD5228a69dc15032fd0fb7100ff8561185e
SHA1f8dbc89fed8078da7f306cb78b92ce04a0bdeb00
SHA256920bec9d500f6446b84399ab4c84858d0f0d7d1abb2e0377399ebbc4bafad709
SHA512373621c4743fa72571b3c8375aa6f7852303a821558b016b002d2af07154787d978f66696db89eeed8fe41f4aed5d66b690d4f87469939f9b1dea2ac2b9101f1
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXEFilesize
1.6MB
MD5228a69dc15032fd0fb7100ff8561185e
SHA1f8dbc89fed8078da7f306cb78b92ce04a0bdeb00
SHA256920bec9d500f6446b84399ab4c84858d0f0d7d1abb2e0377399ebbc4bafad709
SHA512373621c4743fa72571b3c8375aa6f7852303a821558b016b002d2af07154787d978f66696db89eeed8fe41f4aed5d66b690d4f87469939f9b1dea2ac2b9101f1
-
C:\Users\Admin\AppData\Local\Temp\ORACLE.EXEFilesize
10.4MB
MD54a62e0a398ce522dc6dd4b8e16ab868b
SHA1ade65092f26a1caf259e6db07786577956a013fa
SHA2563e7d03bc296e14587a1bc62155046aa28987a37d35ada0be9f5ff3fadbec3ce7
SHA512cd037cc0a7e568a1012bd623f1b7c354be3a055850c5eef3ed7ea63031a76a588071da9522c59ff4012ab9533daaeabbaf33c959e58591ba20c02c6685d261b6
-
C:\Users\Admin\AppData\Local\Temp\ORACLE.EXEFilesize
10.4MB
MD54a62e0a398ce522dc6dd4b8e16ab868b
SHA1ade65092f26a1caf259e6db07786577956a013fa
SHA2563e7d03bc296e14587a1bc62155046aa28987a37d35ada0be9f5ff3fadbec3ce7
SHA512cd037cc0a7e568a1012bd623f1b7c354be3a055850c5eef3ed7ea63031a76a588071da9522c59ff4012ab9533daaeabbaf33c959e58591ba20c02c6685d261b6
-
C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXEFilesize
21.6MB
MD50207955d8c2b954f07309937f6caa1d3
SHA13bf066874405a480a79f8667f9a89d01749a6aa9
SHA256f73d2cc5021cdea3ca2de1940b6ab92fdb9814e9d47b2df36f310dc0facf40ca
SHA512b67d643beda0b9ff299a75cf7c7833d2d44c9d14bb341319fe418d5cc3532cf2ca9d57d5fd6b499ef923a7fbb93427da0635243a880b03bda4a9ba7863115082
-
C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXEFilesize
21.6MB
MD50207955d8c2b954f07309937f6caa1d3
SHA13bf066874405a480a79f8667f9a89d01749a6aa9
SHA256f73d2cc5021cdea3ca2de1940b6ab92fdb9814e9d47b2df36f310dc0facf40ca
SHA512b67d643beda0b9ff299a75cf7c7833d2d44c9d14bb341319fe418d5cc3532cf2ca9d57d5fd6b499ef923a7fbb93427da0635243a880b03bda4a9ba7863115082
-
C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXEFilesize
21.6MB
MD50207955d8c2b954f07309937f6caa1d3
SHA13bf066874405a480a79f8667f9a89d01749a6aa9
SHA256f73d2cc5021cdea3ca2de1940b6ab92fdb9814e9d47b2df36f310dc0facf40ca
SHA512b67d643beda0b9ff299a75cf7c7833d2d44c9d14bb341319fe418d5cc3532cf2ca9d57d5fd6b499ef923a7fbb93427da0635243a880b03bda4a9ba7863115082
-
C:\Users\Admin\AppData\Local\Temp\_MEI16842\python311.dllFilesize
5.5MB
MD5a72993488cecd88b3e19487d646f88f6
SHA15d359f4121e0be04a483f9ad1d8203ffc958f9a0
SHA256aa1e959dcff75a343b448a797d8a5a041eb03b27565a30f70fd081df7a285038
SHA512c895176784b9ac89c9b996c02ec0d0a3f7cd6ebf653a277c20dec104da6a11db084c53dd47c7b6653a448d877ad8e5e79c27db4ea6365ebb8ca2a78aa9c61b38
-
C:\Users\Admin\AppData\Local\Temp\dcfb00f9-5ae7-4197-ba59-e48107e40d35\GunaDotNetRT.dllFilesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a
-
\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXEFilesize
1.6MB
MD5228a69dc15032fd0fb7100ff8561185e
SHA1f8dbc89fed8078da7f306cb78b92ce04a0bdeb00
SHA256920bec9d500f6446b84399ab4c84858d0f0d7d1abb2e0377399ebbc4bafad709
SHA512373621c4743fa72571b3c8375aa6f7852303a821558b016b002d2af07154787d978f66696db89eeed8fe41f4aed5d66b690d4f87469939f9b1dea2ac2b9101f1
-
\Users\Admin\AppData\Local\Temp\ORACLE.EXEFilesize
10.4MB
MD54a62e0a398ce522dc6dd4b8e16ab868b
SHA1ade65092f26a1caf259e6db07786577956a013fa
SHA2563e7d03bc296e14587a1bc62155046aa28987a37d35ada0be9f5ff3fadbec3ce7
SHA512cd037cc0a7e568a1012bd623f1b7c354be3a055850c5eef3ed7ea63031a76a588071da9522c59ff4012ab9533daaeabbaf33c959e58591ba20c02c6685d261b6
-
\Users\Admin\AppData\Local\Temp\ORACLE.EXEFilesize
10.4MB
MD54a62e0a398ce522dc6dd4b8e16ab868b
SHA1ade65092f26a1caf259e6db07786577956a013fa
SHA2563e7d03bc296e14587a1bc62155046aa28987a37d35ada0be9f5ff3fadbec3ce7
SHA512cd037cc0a7e568a1012bd623f1b7c354be3a055850c5eef3ed7ea63031a76a588071da9522c59ff4012ab9533daaeabbaf33c959e58591ba20c02c6685d261b6
-
\Users\Admin\AppData\Local\Temp\RECOVERY.EXEFilesize
21.6MB
MD50207955d8c2b954f07309937f6caa1d3
SHA13bf066874405a480a79f8667f9a89d01749a6aa9
SHA256f73d2cc5021cdea3ca2de1940b6ab92fdb9814e9d47b2df36f310dc0facf40ca
SHA512b67d643beda0b9ff299a75cf7c7833d2d44c9d14bb341319fe418d5cc3532cf2ca9d57d5fd6b499ef923a7fbb93427da0635243a880b03bda4a9ba7863115082
-
\Users\Admin\AppData\Local\Temp\RECOVERY.EXEFilesize
21.6MB
MD50207955d8c2b954f07309937f6caa1d3
SHA13bf066874405a480a79f8667f9a89d01749a6aa9
SHA256f73d2cc5021cdea3ca2de1940b6ab92fdb9814e9d47b2df36f310dc0facf40ca
SHA512b67d643beda0b9ff299a75cf7c7833d2d44c9d14bb341319fe418d5cc3532cf2ca9d57d5fd6b499ef923a7fbb93427da0635243a880b03bda4a9ba7863115082
-
\Users\Admin\AppData\Local\Temp\RECOVERY.EXEFilesize
21.6MB
MD50207955d8c2b954f07309937f6caa1d3
SHA13bf066874405a480a79f8667f9a89d01749a6aa9
SHA256f73d2cc5021cdea3ca2de1940b6ab92fdb9814e9d47b2df36f310dc0facf40ca
SHA512b67d643beda0b9ff299a75cf7c7833d2d44c9d14bb341319fe418d5cc3532cf2ca9d57d5fd6b499ef923a7fbb93427da0635243a880b03bda4a9ba7863115082
-
\Users\Admin\AppData\Local\Temp\_MEI16842\python311.dllFilesize
5.5MB
MD5a72993488cecd88b3e19487d646f88f6
SHA15d359f4121e0be04a483f9ad1d8203ffc958f9a0
SHA256aa1e959dcff75a343b448a797d8a5a041eb03b27565a30f70fd081df7a285038
SHA512c895176784b9ac89c9b996c02ec0d0a3f7cd6ebf653a277c20dec104da6a11db084c53dd47c7b6653a448d877ad8e5e79c27db4ea6365ebb8ca2a78aa9c61b38
-
\Users\Admin\AppData\Local\Temp\dcfb00f9-5ae7-4197-ba59-e48107e40d35\GunaDotNetRT.dllFilesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a
-
memory/904-206-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-116-0x0000000000FD0000-0x000000000117C000-memory.dmpFilesize
1.7MB
-
memory/904-193-0x0000000075150000-0x00000000751D0000-memory.dmpFilesize
512KB
-
memory/904-194-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-195-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-197-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-199-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-201-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-205-0x00000000741C0000-0x00000000741F7000-memory.dmpFilesize
220KB
-
memory/904-185-0x0000000005200000-0x00000000053F2000-memory.dmpFilesize
1.9MB
-
memory/904-208-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-203-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-210-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-212-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-214-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-216-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-218-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-220-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-222-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-186-0x0000000004B60000-0x0000000004BA0000-memory.dmpFilesize
256KB
-
memory/904-225-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-227-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-229-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-233-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-235-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-237-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-231-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-239-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-241-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-243-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-245-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-247-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-249-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-251-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-253-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-255-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-257-0x0000000005200000-0x00000000053EE000-memory.dmpFilesize
1.9MB
-
memory/904-1048-0x0000000004B60000-0x0000000004BA0000-memory.dmpFilesize
256KB