Analysis
-
max time kernel
84s -
max time network
84s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-04-2024 13:33
Behavioral task
behavioral1
Sample
Celery/Celery V1.exe
Resource
win10v2004-20240426-en
General
-
Target
Celery/Celery V1.exe
-
Size
800.0MB
-
MD5
abdf485a5bc69f25b1874b5820cdc932
-
SHA1
62a9f22f5dd232f9b75c8ca4fce4983c8c800aab
-
SHA256
0748a1c46b6ff4d406b95cd07895e9cdc7721d2fb24d62ec10c4273258901765
-
SHA512
066db062f466f0b593ccf539a4ccdb76b7202374e460d9bedad46c421d6aa3b83acba3dbfeef08682768de153f0d377d6478cc4bb16c989ee512fb58a0cddf28
-
SSDEEP
24576:NXtOM33QyjO1IjZSKKBOJJK9UhKoZmM/geEpK7Twuj7zFQ76i:BpLjrjZZrKxoZjaw7T9j7q
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1176-35-0x00000000009C0000-0x0000000000A42000-memory.dmp family_zgrat_v1 -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Molecules.pifdescription pid process target process PID 4456 created 3328 4456 Molecules.pif Explorer.EXE -
Executes dropped EXE 3 IoCs
Processes:
Molecules.pifRegAsm.exeMolecules.pifpid process 4456 Molecules.pif 1176 RegAsm.exe 4684 Molecules.pif -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 4 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exepid process 3844 tasklist.exe 2156 tasklist.exe 4552 tasklist.exe 3736 tasklist.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
Molecules.pifRegAsm.exeMolecules.pifpid process 4456 Molecules.pif 4456 Molecules.pif 4456 Molecules.pif 4456 Molecules.pif 4456 Molecules.pif 4456 Molecules.pif 4456 Molecules.pif 4456 Molecules.pif 1176 RegAsm.exe 4684 Molecules.pif 4684 Molecules.pif 4684 Molecules.pif 4684 Molecules.pif 4684 Molecules.pif 4684 Molecules.pif -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
tasklist.exetasklist.exeRegAsm.exetasklist.exetasklist.exedescription pid process Token: SeDebugPrivilege 2156 tasklist.exe Token: SeDebugPrivilege 4552 tasklist.exe Token: SeDebugPrivilege 1176 RegAsm.exe Token: SeBackupPrivilege 1176 RegAsm.exe Token: SeSecurityPrivilege 1176 RegAsm.exe Token: SeSecurityPrivilege 1176 RegAsm.exe Token: SeSecurityPrivilege 1176 RegAsm.exe Token: SeSecurityPrivilege 1176 RegAsm.exe Token: SeDebugPrivilege 3736 tasklist.exe Token: SeDebugPrivilege 3844 tasklist.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
Molecules.pifMolecules.pifpid process 4456 Molecules.pif 4456 Molecules.pif 4456 Molecules.pif 4684 Molecules.pif 4684 Molecules.pif 4684 Molecules.pif -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
Molecules.pifMolecules.pifpid process 4456 Molecules.pif 4456 Molecules.pif 4456 Molecules.pif 4684 Molecules.pif 4684 Molecules.pif 4684 Molecules.pif -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Celery V1.execmd.exeMolecules.pifCelery V1.execmd.exedescription pid process target process PID 3076 wrote to memory of 2056 3076 Celery V1.exe cmd.exe PID 3076 wrote to memory of 2056 3076 Celery V1.exe cmd.exe PID 3076 wrote to memory of 2056 3076 Celery V1.exe cmd.exe PID 2056 wrote to memory of 2156 2056 cmd.exe tasklist.exe PID 2056 wrote to memory of 2156 2056 cmd.exe tasklist.exe PID 2056 wrote to memory of 2156 2056 cmd.exe tasklist.exe PID 2056 wrote to memory of 4912 2056 cmd.exe findstr.exe PID 2056 wrote to memory of 4912 2056 cmd.exe findstr.exe PID 2056 wrote to memory of 4912 2056 cmd.exe findstr.exe PID 2056 wrote to memory of 4552 2056 cmd.exe tasklist.exe PID 2056 wrote to memory of 4552 2056 cmd.exe tasklist.exe PID 2056 wrote to memory of 4552 2056 cmd.exe tasklist.exe PID 2056 wrote to memory of 252 2056 cmd.exe findstr.exe PID 2056 wrote to memory of 252 2056 cmd.exe findstr.exe PID 2056 wrote to memory of 252 2056 cmd.exe findstr.exe PID 2056 wrote to memory of 3308 2056 cmd.exe cmd.exe PID 2056 wrote to memory of 3308 2056 cmd.exe cmd.exe PID 2056 wrote to memory of 3308 2056 cmd.exe cmd.exe PID 2056 wrote to memory of 1612 2056 cmd.exe findstr.exe PID 2056 wrote to memory of 1612 2056 cmd.exe findstr.exe PID 2056 wrote to memory of 1612 2056 cmd.exe findstr.exe PID 2056 wrote to memory of 3312 2056 cmd.exe cmd.exe PID 2056 wrote to memory of 3312 2056 cmd.exe cmd.exe PID 2056 wrote to memory of 3312 2056 cmd.exe cmd.exe PID 2056 wrote to memory of 4456 2056 cmd.exe Molecules.pif PID 2056 wrote to memory of 4456 2056 cmd.exe Molecules.pif PID 2056 wrote to memory of 4456 2056 cmd.exe Molecules.pif PID 2056 wrote to memory of 1576 2056 cmd.exe PING.EXE PID 2056 wrote to memory of 1576 2056 cmd.exe PING.EXE PID 2056 wrote to memory of 1576 2056 cmd.exe PING.EXE PID 4456 wrote to memory of 1176 4456 Molecules.pif RegAsm.exe PID 4456 wrote to memory of 1176 4456 Molecules.pif RegAsm.exe PID 4456 wrote to memory of 1176 4456 Molecules.pif RegAsm.exe PID 4456 wrote to memory of 1176 4456 Molecules.pif RegAsm.exe PID 4456 wrote to memory of 1176 4456 Molecules.pif RegAsm.exe PID 2724 wrote to memory of 1348 2724 Celery V1.exe cmd.exe PID 2724 wrote to memory of 1348 2724 Celery V1.exe cmd.exe PID 2724 wrote to memory of 1348 2724 Celery V1.exe cmd.exe PID 1348 wrote to memory of 3736 1348 cmd.exe tasklist.exe PID 1348 wrote to memory of 3736 1348 cmd.exe tasklist.exe PID 1348 wrote to memory of 3736 1348 cmd.exe tasklist.exe PID 1348 wrote to memory of 796 1348 cmd.exe findstr.exe PID 1348 wrote to memory of 796 1348 cmd.exe findstr.exe PID 1348 wrote to memory of 796 1348 cmd.exe findstr.exe PID 1348 wrote to memory of 3844 1348 cmd.exe tasklist.exe PID 1348 wrote to memory of 3844 1348 cmd.exe tasklist.exe PID 1348 wrote to memory of 3844 1348 cmd.exe tasklist.exe PID 1348 wrote to memory of 4128 1348 cmd.exe findstr.exe PID 1348 wrote to memory of 4128 1348 cmd.exe findstr.exe PID 1348 wrote to memory of 4128 1348 cmd.exe findstr.exe PID 1348 wrote to memory of 2752 1348 cmd.exe cmd.exe PID 1348 wrote to memory of 2752 1348 cmd.exe cmd.exe PID 1348 wrote to memory of 2752 1348 cmd.exe cmd.exe PID 1348 wrote to memory of 3400 1348 cmd.exe findstr.exe PID 1348 wrote to memory of 3400 1348 cmd.exe findstr.exe PID 1348 wrote to memory of 3400 1348 cmd.exe findstr.exe PID 1348 wrote to memory of 4368 1348 cmd.exe cmd.exe PID 1348 wrote to memory of 4368 1348 cmd.exe cmd.exe PID 1348 wrote to memory of 4368 1348 cmd.exe cmd.exe PID 1348 wrote to memory of 4684 1348 cmd.exe Molecules.pif PID 1348 wrote to memory of 4684 1348 cmd.exe Molecules.pif PID 1348 wrote to memory of 4684 1348 cmd.exe Molecules.pif PID 1348 wrote to memory of 4712 1348 cmd.exe PING.EXE PID 1348 wrote to memory of 4712 1348 cmd.exe PING.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\Celery\Celery V1.exe"C:\Users\Admin\AppData\Local\Temp\Celery\Celery V1.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Hormone Hormone.cmd & Hormone.cmd & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c md 551051254⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BARRYDRIVENMEATLANKA" Occurrence4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Reviewed + Adventure + And + Spirituality + Proprietary + Rpg 55105125\u4⤵
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55105125\Molecules.pif55105125\Molecules.pif 55105125\u4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55105125\RegAsm.exeC:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55105125\RegAsm.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Celery\Celery V1.exe"C:\Users\Admin\AppData\Local\Temp\Celery\Celery V1.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Hormone Hormone.cmd & Hormone.cmd & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c md 551075354⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BARRYDRIVENMEATLANKA" Occurrence4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Reviewed + Adventure + And + Spirituality + Proprietary + Rpg 55107535\u4⤵
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55107535\Molecules.pif55107535\Molecules.pif 55107535\u4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.14⤵
- Runs ping.exe
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55105125\Molecules.pifFilesize
872KB
MD56ee7ddebff0a2b78c7ac30f6e00d1d11
SHA1f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2
SHA256865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4
SHA51257d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55105125\RegAsm.exeFilesize
63KB
MD542ab6e035df99a43dbb879c86b620b91
SHA1c6e116569d17d8142dbb217b1f8bfa95bc148c38
SHA25653195987d396986ebcb20425ac130e78ad308fdbd918f33f3fd92b99abda314b
SHA5122e79de2d394ad33023d71611bb728b254aa4680b5a3a1ef5282b1155ddfaa2f3585c840a6700dfe0d1a276dac801298431f0187086d2e8f96b22f6c808fb97e5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55105125\uFilesize
588KB
MD5467402743dd2623114ad4fed93843ff6
SHA105f54d31be9f3c6bab6d588369edfa1606d80bf7
SHA2561bdbad9c9330955976daa2d6d2d00a94b5c6d8c66bc313e7eb2d8a0d3b2ccdf3
SHA51254c20a2823e906be087e267c5b1f8d4915e1afbc3a540b0db2fb395d14fbd8b61a99138aa6e8df3cef80847a01ec5d223973e9958cfc0f4ff79061cdaf627a1b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\AdventureFilesize
85KB
MD5607d37a28e052b6a3c4704056b93fd72
SHA13d8bed7e30a08c933a236ecad87c10eb8cc70098
SHA256997e31dac59b5eefaea4901b981ed1b0699e849376f8440ead6eecbf450d2ac3
SHA51290e6a42a587de7c997102368ed1d98ab2daa789e8f4d1a8f99d0031697b0bca01e7d24245ac5384385a59c6181614ad2101e4faaea42faf14503eea38b6a76f8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\AndFilesize
104KB
MD552ef794f8a37c32e26f7fe7c9a93479d
SHA10fba49275ef2cf68eb398540f6cad6b32452c656
SHA25685364c627be59f1393fe15eeff1d7eb0c12fe48bf4374379e92ae3df240f459d
SHA51206f3c0068894781a5094725d650e7a952f2ff8bcf6f2fa079d84faa3521221fc1b04c2e6aceef382a57796742174d17e451484d33f6a0b477b557b100fb4b2b5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\CurveFilesize
291KB
MD5b88f094a190f1ec96a75301857332100
SHA1f78742eeee92c4598e03b26fae7c06f8afb5cce9
SHA2561a36333113637ffadb22f400700abaab896b2633d041bf72471dee1a466fc39e
SHA512e285371656e0b513f37fb50f2021a72543e5c2405604730611a0d95f850925d6342670713843af2ed724f1f58528bcfa723b30230812faf45283c0a58352f656
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\EssenceFilesize
103KB
MD5989668bcd752ccd5311db758eacd5879
SHA12dc11c1e56d5cff9717b4927c884774f8c48fc49
SHA256f65fdcf542bd5d8c4f25c69ca2f5461ad473b873dcac5969977ed5c3488b7e15
SHA51268982e6d2b95c99d84f00f6cc9f886157285d1aa4364fe851fcc4da67810b96b237e0008e92cce9fa5443f1f73e7761dd6b8998d2b040843f391958658d1c139
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\HormoneFilesize
24KB
MD5924dc08c5ea1819adb3238301a40aeaf
SHA1101c9f907bc770f4b3e526b1ec638d6fa5d9617d
SHA25627ebc254bae189272ab946f52a44f5d0faf240a8c02aeb039e5d7aab05f3a244
SHA512ccee76a6f4d3cc11e59cb09bf16d048f63e0a70d761390fe92a240cb784193117f97053b9694270371395b62943465e11ae2c4fe2e2ddc29dbffe99b09a7a08b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\KindsFilesize
267KB
MD5ed8eec0cd0c783d40277993defca652a
SHA1266215e6a72173004fced0f66b02b125c5b662eb
SHA256b3cf65743cb0c4f6c8d16c873c3d956a74545f5a81107e38b09d055c97f9d01a
SHA5121925645f02795e2ebf810bb68bf384ff7df28063632fcf03f95c847393eca60aa71a9a4e7e61f2d1bbc4177797b59a15a38b5dff7c441b822c876fff256abea6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\MedlineFilesize
169KB
MD51b37486aa580382857c5be68f90bc456
SHA10b1b0a27251c3b82f946ab6f24fd7f34afadef84
SHA256e29fe0e88a607b1c390c4965d23666f88941ef969726bceb3f5584dfd9f9bd2b
SHA512e5f8ccd9873c075e8ffd5f7ad0ef5c235d7a14ed516cd893a0aea4cd84743944f621d4c9cad1cb895665bdcc0811781721436a22ccddcbe0ccf6200adf8e628c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\OccurrenceFilesize
155B
MD5d91bc77bb1d32b411cdc0094cc831039
SHA18cf67f88f7a5ac1563c9fd12e0605f76e23597cc
SHA256cc36fa9ceabd9879e366d0a073ab1eca45ed10bd5848650185f8083d6c4ce067
SHA512b82a016bfb6d498e8fefec616f6067711447ea7c46f907172171fdb14fc0a23cb3dfd70be673200d50dda6ab223ba0558213313a09ed40fdf5882d44893f5914
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\ProprietaryFilesize
41KB
MD5941fa8b8c391ac407b46f91b32305790
SHA11e1cd36e2714b823c212d26abec0d717552c2617
SHA25659b6e82e5dfb2a7aafa1273157db6b3cc4295600d83700f82218cc5056970e46
SHA512371af08ee59690667045cf68239eeaa9fbc0e2a5840c45852c84fd11c23faa2ae1c8baa5083e33b79d84dbc8476d633c359f23bf78e1c3b26e3e9103ef9efa95
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\ReviewedFilesize
48KB
MD5a15c367162090d9b3bf4a4add6f32235
SHA1f94f572b9901ce2d3740e1addc962e185f14d830
SHA256bb53cfabb3b4c08b776bc16cd67f5326130b53c22b61479939f3b81a6d661e3d
SHA512221d6f07e2fa8c1542a4425d2d57d83fbee993dbca0813acb06f4b3e2faff3aa5b8054e7da98174605c5cf1f0a5723fc485ba1441d52c28a702ec632761948db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\RpgFilesize
144KB
MD5da09ca5a62b9a76e7d4d60919729a03a
SHA1c41ae7d185c5d5a9fbddded1a09d4035cf62a034
SHA25645a420e7c41346b52107eb47f58e423cfda3b9437910ec585e8edf53234c6d47
SHA51204e52b2687d2d17bc19141817223515a515780097850678545ca4bcf44ca56f9601c6c01c35a178fac9d96f8ef1569d7205bd3871a5f17005bf2cefa131a6708
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\SpiritualityFilesize
166KB
MD59c0009a72dd58619f00dd497fce85859
SHA12e56a3c785018ac40b0772fc2379540e1c154081
SHA2564ad75e65d81fa4a63c6e761a482edc743f7446f8893abd35966e0280d2a59126
SHA512f763dce6959bbaa38f101c8aa33dd545e6335f0357b3b23e76a334313bc88ee92f0958b3d2cb0b136a185185435c380ab4d7750becd1d9be32fe2a829fc3129e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\TuesdayFilesize
42KB
MD5b40715cfdce6d2555492ad9c86c4c2f9
SHA1959db7f4b68b02514b25f19edb35d2d854c0bc68
SHA2569174a007a19303faefacbcd80be8d1c1a9be2cdf13440b1827d0e0c27c1d3864
SHA5121eb14b02fab454769f64b3a951f411abada7422b67801437ddb64ac1b5873c8cbe17d09ce48a2872922c6c7d456bec3892d808706d260f96a3b589570842fdd4
-
memory/1176-42-0x0000000008320000-0x000000000842A000-memory.dmpFilesize
1.0MB
-
memory/1176-44-0x00000000082B0000-0x00000000082EC000-memory.dmpFilesize
240KB
-
memory/1176-39-0x0000000005170000-0x0000000005202000-memory.dmpFilesize
584KB
-
memory/1176-40-0x0000000005210000-0x000000000521A000-memory.dmpFilesize
40KB
-
memory/1176-41-0x00000000087F0000-0x0000000008E08000-memory.dmpFilesize
6.1MB
-
memory/1176-35-0x00000000009C0000-0x0000000000A42000-memory.dmpFilesize
520KB
-
memory/1176-43-0x0000000008250000-0x0000000008262000-memory.dmpFilesize
72KB
-
memory/1176-38-0x0000000005680000-0x0000000005C26000-memory.dmpFilesize
5.6MB
-
memory/1176-45-0x0000000008430000-0x000000000847C000-memory.dmpFilesize
304KB
-
memory/1176-46-0x00000000085A0000-0x0000000008606000-memory.dmpFilesize
408KB
-
memory/1176-47-0x0000000008F10000-0x0000000008F86000-memory.dmpFilesize
472KB
-
memory/1176-48-0x0000000008770000-0x000000000878E000-memory.dmpFilesize
120KB
-
memory/1176-49-0x0000000009950000-0x0000000009B12000-memory.dmpFilesize
1.8MB
-
memory/1176-50-0x000000000A050000-0x000000000A57C000-memory.dmpFilesize
5.2MB