Analysis

  • max time kernel
    102s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    16-08-2020 14:59

General

  • Target

    7e6e324c1c852f1be6ec2037cc0871c7.exe

  • Size

    648KB

  • MD5

    7e6e324c1c852f1be6ec2037cc0871c7

  • SHA1

    3cf0c58d352f8589c30e31eaf9dbc4290e15abf9

  • SHA256

    308c96557c6be5d4519ba4bac38c23e611c7b61683cfc1063a6009e216c24f5e

  • SHA512

    41ab707a26727dbff9c0ed3067949a2f11e6cd530341d2d6ded1ecd3ce58e07e8a870587df112cac8bbdebd635696c219ec08c0400cfa3cf2d72f45a1cc22bb1

Malware Config

Extracted

Path

C:\Users\Admin\AppData\LocalLow\machineinfo.txt

Family

raccoon

Ransom Note
[Raccoon Stealer] - v1.5.13-af-hotfix Release Build compiled on Mon Jul 6 14:33:03 2020 Launched at: 2020.08.16 - 14:59:56 GMT Bot_ID: 664A9041-4AC4-46F3-B3DC-87DB4D57890E_Admin Running on a desktop =R=A=C=C=O=O=N= - Cookies: 0 - Passwords: 5 - Files: 0 System Information: - System Language: English - System TimeZone: -0 hrs - IP: 154.61.71.51 - Location: 37.750999, -97.821999 | ?, ?, United States (?) - ComputerName: GOHCSFBB - Username: Admin - Windows version: NT 10.0 - Product name: Windows 10 Pro - System arch: x64 - CPU: Persocon Processor 2.5+ (2 cores) - RAM: 4095 MB (696 MB used) - Screen resolution: 1280x720 - Display devices: 0) Microsoft Basic Display Adapter ============

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Raccoon log file 1 IoCs

    Detects a log file produced by the Raccoon Stealer.

  • ModiLoader First Stage 1 IoCs
  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • JavaScript code in executable 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 188 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e6e324c1c852f1be6ec2037cc0871c7.exe
    "C:\Users\Admin\AppData\Local\Temp\7e6e324c1c852f1be6ec2037cc0871c7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Users\Admin\AppData\Local\Temp\Uivcxbdsf.exe
      "C:\Users\Admin\AppData\Local\Temp\Uivcxbdsf.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1944
      • C:\Users\Admin\AppData\Local\Temp\JHGsvcsdfe.exe
        "C:\Users\Admin\AppData\Local\Temp\JHGsvcsdfe.exe"
        3⤵
        • Executes dropped EXE
        PID:872
      • C:\Users\Admin\AppData\Local\Temp\Uivcxbdsf.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        PID:580
    • C:\Users\Admin\AppData\Local\Temp\7e6e324c1c852f1be6ec2037cc0871c7.exe
      "{path}"
      2⤵
      • Loads dropped DLL
      • Drops desktop.ini file(s)
      • Suspicious use of WriteProcessMemory
      PID:3412
      • C:\Users\Admin\AppData\Local\Temp\CrvWVRZK6c.exe
        "C:\Users\Admin\AppData\Local\Temp\CrvWVRZK6c.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3916
        • C:\Windows\SysWOW64\Notepad.exe
          "C:\Windows\System32\Notepad.exe"
          4⤵
            PID:3904
        • C:\Users\Admin\AppData\Local\Temp\dMNhHoQtnv.exe
          "C:\Users\Admin\AppData\Local\Temp\dMNhHoQtnv.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2104
        • C:\Users\Admin\AppData\Local\Temp\vr0p2mwe91.exe
          "C:\Users\Admin\AppData\Local\Temp\vr0p2mwe91.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2608
          • C:\Users\Admin\AppData\Local\Temp\vr0p2mwe91.exe
            "{path}"
            4⤵
              PID:3260
          • C:\Users\Admin\AppData\Local\Temp\5u0dyVU7Eb.exe
            "C:\Users\Admin\AppData\Local\Temp\5u0dyVU7Eb.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3816
            • C:\Users\Admin\AppData\Local\Temp\5u0dyVU7Eb.exe
              "{path}"
              4⤵
                PID:3992
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\7e6e324c1c852f1be6ec2037cc0871c7.exe"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3368
              • C:\Windows\SysWOW64\timeout.exe
                timeout /T 10 /NOBREAK
                4⤵
                • Delays execution with timeout.exe
                PID:420

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Credential Access

        Credentials in Files

        2
        T1081

        Discovery

        Query Registry

        1
        T1012

        Collection

        Data from Local System

        2
        T1005

        Command and Control

        Web Service

        1
        T1102

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5u0dyVU7Eb.exe
          MD5

          286566653b4469591842c57ed2e7dc96

          SHA1

          28129b1a563cb2b9390daede9eceade6b2e2c534

          SHA256

          ad17f3d9f0597304a688ac4abb56784f61f4721f2cb5c256de6c143edd9cf445

          SHA512

          94ba75df279f3a01a4955c402d27bef3e830a52f209d0e7411431b5cfb13d5b6ff3cdf52e2c050e99ebfa7e030fbabe7216446308c45ca93454ff7003a92e239

        • C:\Users\Admin\AppData\Local\Temp\5u0dyVU7Eb.exe
          MD5

          286566653b4469591842c57ed2e7dc96

          SHA1

          28129b1a563cb2b9390daede9eceade6b2e2c534

          SHA256

          ad17f3d9f0597304a688ac4abb56784f61f4721f2cb5c256de6c143edd9cf445

          SHA512

          94ba75df279f3a01a4955c402d27bef3e830a52f209d0e7411431b5cfb13d5b6ff3cdf52e2c050e99ebfa7e030fbabe7216446308c45ca93454ff7003a92e239

        • C:\Users\Admin\AppData\Local\Temp\CrvWVRZK6c.exe
          MD5

          d127f9bee5ec56dc1dea4fc56d53a81b

          SHA1

          dfec988bbc2ddf381af9a682a89243be18150708

          SHA256

          c10cdf38e26339e4373c7e0a9a119381e703c7b8404ce0ed694fb3aae286d9b9

          SHA512

          9a5fd90c65c0e054b9e27cb93a8cff451d8ba91c1f4c08d8ef84e5919c0f4997cd3daff4ffc64862c803233bf6ce25ac6db79c912c71b6b6c68f52020d82ea93

        • C:\Users\Admin\AppData\Local\Temp\CrvWVRZK6c.exe
          MD5

          d127f9bee5ec56dc1dea4fc56d53a81b

          SHA1

          dfec988bbc2ddf381af9a682a89243be18150708

          SHA256

          c10cdf38e26339e4373c7e0a9a119381e703c7b8404ce0ed694fb3aae286d9b9

          SHA512

          9a5fd90c65c0e054b9e27cb93a8cff451d8ba91c1f4c08d8ef84e5919c0f4997cd3daff4ffc64862c803233bf6ce25ac6db79c912c71b6b6c68f52020d82ea93

        • C:\Users\Admin\AppData\Local\Temp\JHGsvcsdfe.exe
          MD5

          a3d0da79d4c2712730bb86dbc807718f

          SHA1

          01934f6566f29c0a075b2b9bcbc15c049c4a7aea

          SHA256

          947835d2a4927cc0e33011c4d419e39fffdef70a4c36953a6c028ab676a48175

          SHA512

          b0b6ddb3a4e8650e2553d0ab4979eb61a8b0b11720730dba597a2a01923e235c94dbcae1ad23c803ae15d659568691e5fccfb1861c560547bca60bc8581ae015

        • C:\Users\Admin\AppData\Local\Temp\JHGsvcsdfe.exe
          MD5

          a3d0da79d4c2712730bb86dbc807718f

          SHA1

          01934f6566f29c0a075b2b9bcbc15c049c4a7aea

          SHA256

          947835d2a4927cc0e33011c4d419e39fffdef70a4c36953a6c028ab676a48175

          SHA512

          b0b6ddb3a4e8650e2553d0ab4979eb61a8b0b11720730dba597a2a01923e235c94dbcae1ad23c803ae15d659568691e5fccfb1861c560547bca60bc8581ae015

        • C:\Users\Admin\AppData\Local\Temp\Uivcxbdsf.exe
          MD5

          75bfc1087080fd3a67e35850ec9e877a

          SHA1

          5a6fc01f58aad69e7843ef8087f99c66d6657f46

          SHA256

          e539fe1b7096b7a1966ebbe10e2361c05fd90adf8ed312406f90efe13744e5af

          SHA512

          9a918f1af2bad68e107c2001bca9f5af7cd0490a0b2f1ba2a671b8fd9700a00c663f6423070a3e69fe09c5ab7e5097bfe729943a39d472154288013632d1544b

        • C:\Users\Admin\AppData\Local\Temp\Uivcxbdsf.exe
          MD5

          75bfc1087080fd3a67e35850ec9e877a

          SHA1

          5a6fc01f58aad69e7843ef8087f99c66d6657f46

          SHA256

          e539fe1b7096b7a1966ebbe10e2361c05fd90adf8ed312406f90efe13744e5af

          SHA512

          9a918f1af2bad68e107c2001bca9f5af7cd0490a0b2f1ba2a671b8fd9700a00c663f6423070a3e69fe09c5ab7e5097bfe729943a39d472154288013632d1544b

        • C:\Users\Admin\AppData\Local\Temp\Uivcxbdsf.exe
          MD5

          75bfc1087080fd3a67e35850ec9e877a

          SHA1

          5a6fc01f58aad69e7843ef8087f99c66d6657f46

          SHA256

          e539fe1b7096b7a1966ebbe10e2361c05fd90adf8ed312406f90efe13744e5af

          SHA512

          9a918f1af2bad68e107c2001bca9f5af7cd0490a0b2f1ba2a671b8fd9700a00c663f6423070a3e69fe09c5ab7e5097bfe729943a39d472154288013632d1544b

        • C:\Users\Admin\AppData\Local\Temp\dMNhHoQtnv.exe
          MD5

          1f9445786d9bc14140669206fd7cda0f

          SHA1

          9b949988bb49e8c026020973f0010cd305c97baf

          SHA256

          82bc5eba22dc5eb72b08138bffbf1efa146e98418ed31d8f641c81e21f38596b

          SHA512

          472f58984f440b0643b641ce371aa20f3493ac33690ecd60f5d01913c1f2a5432e2fa2cc499ce8108ebf00f296d25a82bd16551d625b558b57154cbe741449f0

        • C:\Users\Admin\AppData\Local\Temp\dMNhHoQtnv.exe
          MD5

          1f9445786d9bc14140669206fd7cda0f

          SHA1

          9b949988bb49e8c026020973f0010cd305c97baf

          SHA256

          82bc5eba22dc5eb72b08138bffbf1efa146e98418ed31d8f641c81e21f38596b

          SHA512

          472f58984f440b0643b641ce371aa20f3493ac33690ecd60f5d01913c1f2a5432e2fa2cc499ce8108ebf00f296d25a82bd16551d625b558b57154cbe741449f0

        • C:\Users\Admin\AppData\Local\Temp\vr0p2mwe91.exe
          MD5

          a85c5f4c4dc927fcac39f255e988efe7

          SHA1

          9f0493c2998f29e1d0bb5817679a93cbff4e01d4

          SHA256

          51ba8e77012c53a06c08745104e8726d012603295cc62d20fe9ad7fc4cff2483

          SHA512

          ac8ca341ec2d586f5f4b3980e62012112ca25ad35a4da4213f0e5aa099462ec21cf7c4362326460a107bfde2444e71befe3f91c650d29e0b8f2e986ccf1350a0

        • C:\Users\Admin\AppData\Local\Temp\vr0p2mwe91.exe
          MD5

          a85c5f4c4dc927fcac39f255e988efe7

          SHA1

          9f0493c2998f29e1d0bb5817679a93cbff4e01d4

          SHA256

          51ba8e77012c53a06c08745104e8726d012603295cc62d20fe9ad7fc4cff2483

          SHA512

          ac8ca341ec2d586f5f4b3980e62012112ca25ad35a4da4213f0e5aa099462ec21cf7c4362326460a107bfde2444e71befe3f91c650d29e0b8f2e986ccf1350a0

        • \Users\Admin\AppData\LocalLow\3098htrhpen8ifg0\freebl3.dll
          MD5

          60acd24430204ad2dc7f148b8cfe9bdc

          SHA1

          989f377b9117d7cb21cbe92a4117f88f9c7693d9

          SHA256

          9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

          SHA512

          626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

        • \Users\Admin\AppData\LocalLow\3098htrhpen8ifg0\freebl3.dll
          MD5

          60acd24430204ad2dc7f148b8cfe9bdc

          SHA1

          989f377b9117d7cb21cbe92a4117f88f9c7693d9

          SHA256

          9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

          SHA512

          626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

        • \Users\Admin\AppData\LocalLow\3098htrhpen8ifg0\freebl3.dll
          MD5

          60acd24430204ad2dc7f148b8cfe9bdc

          SHA1

          989f377b9117d7cb21cbe92a4117f88f9c7693d9

          SHA256

          9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

          SHA512

          626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

        • \Users\Admin\AppData\LocalLow\3098htrhpen8ifg0\mozglue.dll
          MD5

          eae9273f8cdcf9321c6c37c244773139

          SHA1

          8378e2a2f3635574c106eea8419b5eb00b8489b0

          SHA256

          a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc

          SHA512

          06e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097

        • \Users\Admin\AppData\LocalLow\3098htrhpen8ifg0\nss3.dll
          MD5

          02cc7b8ee30056d5912de54f1bdfc219

          SHA1

          a6923da95705fb81e368ae48f93d28522ef552fb

          SHA256

          1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

          SHA512

          0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

        • \Users\Admin\AppData\LocalLow\3098htrhpen8ifg0\softokn3.dll
          MD5

          4e8df049f3459fa94ab6ad387f3561ac

          SHA1

          06ed392bc29ad9d5fc05ee254c2625fd65925114

          SHA256

          25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

          SHA512

          3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

        • \Users\Admin\AppData\LocalLow\3098htrhpen8ifg0\softokn3.dll
          MD5

          4e8df049f3459fa94ab6ad387f3561ac

          SHA1

          06ed392bc29ad9d5fc05ee254c2625fd65925114

          SHA256

          25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

          SHA512

          3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

        • \Users\Admin\AppData\LocalLow\sqlite3.dll
          MD5

          f964811b68f9f1487c2b41e1aef576ce

          SHA1

          b423959793f14b1416bc3b7051bed58a1034025f

          SHA256

          83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

          SHA512

          565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

        • memory/420-38-0x0000000000000000-mapping.dmp
        • memory/580-85-0x000000000041A684-mapping.dmp
        • memory/580-88-0x0000000000400000-0x0000000000420000-memory.dmp
          Filesize

          128KB

        • memory/580-84-0x0000000000400000-0x0000000000420000-memory.dmp
          Filesize

          128KB

        • memory/872-80-0x0000000000000000-mapping.dmp
        • memory/1944-1-0x0000000000000000-mapping.dmp
        • memory/2104-92-0x0000000007300000-0x000000000732F000-memory.dmp
          Filesize

          188KB

        • memory/2104-26-0x000000006EE70000-0x000000006F55E000-memory.dmp
          Filesize

          6.9MB

        • memory/2104-50-0x0000000005650000-0x0000000005654000-memory.dmp
          Filesize

          16KB

        • memory/2104-47-0x0000000006F20000-0x0000000006F21000-memory.dmp
          Filesize

          4KB

        • memory/2104-18-0x0000000000000000-mapping.dmp
        • memory/2104-33-0x0000000000B30000-0x0000000000B31000-memory.dmp
          Filesize

          4KB

        • memory/2104-37-0x0000000005980000-0x0000000005981000-memory.dmp
          Filesize

          4KB

        • memory/2608-41-0x0000000005420000-0x0000000005421000-memory.dmp
          Filesize

          4KB

        • memory/2608-21-0x0000000000000000-mapping.dmp
        • memory/2608-44-0x00000000053D0000-0x00000000053D1000-memory.dmp
          Filesize

          4KB

        • memory/2608-31-0x0000000000B50000-0x0000000000B51000-memory.dmp
          Filesize

          4KB

        • memory/2608-97-0x0000000005870000-0x0000000005876000-memory.dmp
          Filesize

          24KB

        • memory/2608-90-0x00000000072D0000-0x00000000072F9000-memory.dmp
          Filesize

          164KB

        • memory/2608-25-0x000000006EE70000-0x000000006F55E000-memory.dmp
          Filesize

          6.9MB

        • memory/3368-27-0x0000000000000000-mapping.dmp
        • memory/3412-6-0x0000000000400000-0x0000000000493000-memory.dmp
          Filesize

          588KB

        • memory/3412-5-0x000000000043FA98-mapping.dmp
        • memory/3412-4-0x0000000000400000-0x0000000000493000-memory.dmp
          Filesize

          588KB

        • memory/3816-95-0x0000000004C10000-0x0000000004C14000-memory.dmp
          Filesize

          16KB

        • memory/3816-24-0x0000000000000000-mapping.dmp
        • memory/3816-32-0x0000000000130000-0x0000000000131000-memory.dmp
          Filesize

          4KB

        • memory/3816-89-0x0000000006C60000-0x0000000006C88000-memory.dmp
          Filesize

          160KB

        • memory/3816-30-0x000000006EE70000-0x000000006F55E000-memory.dmp
          Filesize

          6.9MB

        • memory/3904-56-0x0000000000000000-mapping.dmp
        • memory/3904-81-0x0000000000000000-mapping.dmp
        • memory/3904-66-0x0000000000000000-mapping.dmp
        • memory/3904-67-0x0000000000000000-mapping.dmp
        • memory/3904-68-0x0000000000000000-mapping.dmp
        • memory/3904-69-0x0000000000000000-mapping.dmp
        • memory/3904-70-0x0000000000000000-mapping.dmp
        • memory/3904-71-0x0000000000000000-mapping.dmp
        • memory/3904-72-0x0000000000000000-mapping.dmp
        • memory/3904-73-0x0000000000000000-mapping.dmp
        • memory/3904-74-0x0000000000000000-mapping.dmp
        • memory/3904-75-0x0000000000000000-mapping.dmp
        • memory/3904-76-0x0000000000000000-mapping.dmp
        • memory/3904-77-0x0000000000000000-mapping.dmp
        • memory/3904-78-0x0000000000000000-mapping.dmp
        • memory/3904-79-0x0000000000000000-mapping.dmp
        • memory/3904-64-0x0000000000000000-mapping.dmp
        • memory/3904-65-0x0000000000000000-mapping.dmp
        • memory/3904-63-0x0000000000000000-mapping.dmp
        • memory/3904-62-0x0000000000000000-mapping.dmp
        • memory/3904-61-0x0000000000000000-mapping.dmp
        • memory/3904-60-0x0000000000000000-mapping.dmp
        • memory/3904-86-0x0000000000000000-mapping.dmp
        • memory/3904-59-0x0000000000000000-mapping.dmp
        • memory/3904-58-0x0000000000000000-mapping.dmp
        • memory/3904-57-0x0000000000000000-mapping.dmp
        • memory/3904-55-0x0000000000000000-mapping.dmp
        • memory/3904-91-0x0000000000000000-mapping.dmp
        • memory/3904-96-0x0000000000000000-mapping.dmp
        • memory/3904-93-0x0000000000000000-mapping.dmp
        • memory/3904-94-0x0000000000000000-mapping.dmp
        • memory/3916-53-0x0000000002140000-0x0000000002150000-memory.dmp
          Filesize

          64KB

        • memory/3916-54-0x00000000037B0000-0x00000000037FB000-memory.dmp
          Filesize

          300KB

        • memory/3916-15-0x0000000000000000-mapping.dmp