Analysis

  • max time kernel
    120s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    17-01-2022 16:01

General

  • Target

    63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b.exe

  • Size

    1.0MB

  • MD5

    acabd1f99b9e449d951dea975e1f1ad5

  • SHA1

    ef545ca153737d6246be2cd3de1b26fb92241327

  • SHA256

    63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b

  • SHA512

    e92d6a0f11d2d96267682eed231e8f5580e32df705bc6c0eeb0b6f7fbbe7c56c67267c8e1994c55bb724343e904137808e1fc9636750d2730aa42b3bf217abd1

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 40 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks whether UAC is enabled 1 TTPs 10 IoCs
  • Suspicious use of SetThreadContext 18 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b.exe
    "C:\Users\Admin\AppData\Local\Temp\63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b.exe"
    1⤵
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Windows\bfsvc.exe
      C:\Windows\bfsvc.exe -a TON --pool https://server1.whalestonpool.com --user EQBUrKc4jK39eXKGOmJfeEZjVLiZ9aSuxI-G7GPl6_9e9Bwj
      2⤵
        PID:2812
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "None" "ton"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:780
        • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
          3⤵
          • Executes dropped EXE
          • Checks BIOS information in registry
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4080
          • C:\Windows\bfsvc.exe
            C:\Windows\bfsvc.exe -a TON --pool https://server1.whalestonpool.com --user EQBUrKc4jK39eXKGOmJfeEZjVLiZ9aSuxI-G7GPl6_9e9Bwj
            4⤵
              PID:4192
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "None" "ton"
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4332
              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                5⤵
                • Executes dropped EXE
                • Checks BIOS information in registry
                • Adds Run key to start application
                • Checks whether UAC is enabled
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3232
                • C:\Windows\bfsvc.exe
                  C:\Windows\bfsvc.exe -a TON --pool https://server1.whalestonpool.com --user EQBUrKc4jK39eXKGOmJfeEZjVLiZ9aSuxI-G7GPl6_9e9Bwj
                  6⤵
                    PID:4244
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "None" "ton"
                    6⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:384
                    • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                      "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                      7⤵
                      • Executes dropped EXE
                      • Checks BIOS information in registry
                      • Adds Run key to start application
                      • Checks whether UAC is enabled
                      • Suspicious use of SetThreadContext
                      PID:1844
                      • C:\Windows\bfsvc.exe
                        C:\Windows\bfsvc.exe -a TON --pool https://server1.whalestonpool.com --user EQBUrKc4jK39eXKGOmJfeEZjVLiZ9aSuxI-G7GPl6_9e9Bwj
                        8⤵
                          PID:2264
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "None" "ton"
                          8⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2464
                          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                            "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                            9⤵
                            • Executes dropped EXE
                            • Checks BIOS information in registry
                            • Adds Run key to start application
                            • Checks whether UAC is enabled
                            • Suspicious use of SetThreadContext
                            PID:3016
                            • C:\Windows\bfsvc.exe
                              C:\Windows\bfsvc.exe -a TON --pool https://server1.whalestonpool.com --user EQBUrKc4jK39eXKGOmJfeEZjVLiZ9aSuxI-G7GPl6_9e9Bwj
                              10⤵
                                PID:4404
                              • C:\Windows\explorer.exe
                                C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "None" "ton"
                                10⤵
                                  PID:4784
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                    11⤵
                                    • Executes dropped EXE
                                    • Checks BIOS information in registry
                                    • Adds Run key to start application
                                    • Checks whether UAC is enabled
                                    • Suspicious use of SetThreadContext
                                    PID:4928
                                    • C:\Windows\bfsvc.exe
                                      C:\Windows\bfsvc.exe -a TON --pool https://server1.whalestonpool.com --user EQBUrKc4jK39eXKGOmJfeEZjVLiZ9aSuxI-G7GPl6_9e9Bwj
                                      12⤵
                                        PID:4860
                                      • C:\Windows\explorer.exe
                                        C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "None" "ton"
                                        12⤵
                                          PID:4576
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                            13⤵
                                            • Executes dropped EXE
                                            • Checks BIOS information in registry
                                            • Adds Run key to start application
                                            • Checks whether UAC is enabled
                                            • Suspicious use of SetThreadContext
                                            PID:4248
                                            • C:\Windows\bfsvc.exe
                                              C:\Windows\bfsvc.exe -a TON --pool https://server1.whalestonpool.com --user EQBUrKc4jK39eXKGOmJfeEZjVLiZ9aSuxI-G7GPl6_9e9Bwj
                                              14⤵
                                                PID:5032
                                              • C:\Windows\explorer.exe
                                                C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "None" "ton"
                                                14⤵
                                                  PID:628
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                    15⤵
                                                    • Executes dropped EXE
                                                    • Checks BIOS information in registry
                                                    • Adds Run key to start application
                                                    • Checks whether UAC is enabled
                                                    • Suspicious use of SetThreadContext
                                                    PID:3024
                                                    • C:\Windows\bfsvc.exe
                                                      C:\Windows\bfsvc.exe -a TON --pool https://server1.whalestonpool.com --user EQBUrKc4jK39eXKGOmJfeEZjVLiZ9aSuxI-G7GPl6_9e9Bwj
                                                      16⤵
                                                        PID:4972
                                                      • C:\Windows\explorer.exe
                                                        C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "None" "ton"
                                                        16⤵
                                                          PID:1628
                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                            "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                            17⤵
                                                            • Executes dropped EXE
                                                            • Checks BIOS information in registry
                                                            • Adds Run key to start application
                                                            • Checks whether UAC is enabled
                                                            • Suspicious use of SetThreadContext
                                                            PID:2952
                                                            • C:\Windows\bfsvc.exe
                                                              C:\Windows\bfsvc.exe -a TON --pool https://server1.whalestonpool.com --user EQBUrKc4jK39eXKGOmJfeEZjVLiZ9aSuxI-G7GPl6_9e9Bwj
                                                              18⤵
                                                                PID:1956
                                                              • C:\Windows\explorer.exe
                                                                C:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "None" "ton"
                                                                18⤵
                                                                  PID:4424
                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                                    19⤵
                                                                    • Executes dropped EXE
                                                                    • Checks BIOS information in registry
                                                                    • Adds Run key to start application
                                                                    • Checks whether UAC is enabled
                                                                    PID:3068
                                                                    • C:\Windows\system32\WerFault.exe
                                                                      C:\Windows\system32\WerFault.exe -u -p 3068 -s 424
                                                                      20⤵
                                                                      • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                      • Program crash
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:3580

                              Network

                              MITRE ATT&CK Matrix ATT&CK v6

                              Persistence

                              Modify Existing Service

                              1
                              T1031

                              Registry Run Keys / Startup Folder

                              1
                              T1060

                              Defense Evasion

                              Modify Registry

                              2
                              T1112

                              Disabling Security Tools

                              1
                              T1089

                              Virtualization/Sandbox Evasion

                              1
                              T1497

                              Discovery

                              Query Registry

                              2
                              T1012

                              Virtualization/Sandbox Evasion

                              1
                              T1497

                              System Information Discovery

                              2
                              T1082

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                MD5

                                acabd1f99b9e449d951dea975e1f1ad5

                                SHA1

                                ef545ca153737d6246be2cd3de1b26fb92241327

                                SHA256

                                63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b

                                SHA512

                                e92d6a0f11d2d96267682eed231e8f5580e32df705bc6c0eeb0b6f7fbbe7c56c67267c8e1994c55bb724343e904137808e1fc9636750d2730aa42b3bf217abd1

                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                MD5

                                acabd1f99b9e449d951dea975e1f1ad5

                                SHA1

                                ef545ca153737d6246be2cd3de1b26fb92241327

                                SHA256

                                63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b

                                SHA512

                                e92d6a0f11d2d96267682eed231e8f5580e32df705bc6c0eeb0b6f7fbbe7c56c67267c8e1994c55bb724343e904137808e1fc9636750d2730aa42b3bf217abd1

                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                MD5

                                acabd1f99b9e449d951dea975e1f1ad5

                                SHA1

                                ef545ca153737d6246be2cd3de1b26fb92241327

                                SHA256

                                63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b

                                SHA512

                                e92d6a0f11d2d96267682eed231e8f5580e32df705bc6c0eeb0b6f7fbbe7c56c67267c8e1994c55bb724343e904137808e1fc9636750d2730aa42b3bf217abd1

                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                MD5

                                acabd1f99b9e449d951dea975e1f1ad5

                                SHA1

                                ef545ca153737d6246be2cd3de1b26fb92241327

                                SHA256

                                63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b

                                SHA512

                                e92d6a0f11d2d96267682eed231e8f5580e32df705bc6c0eeb0b6f7fbbe7c56c67267c8e1994c55bb724343e904137808e1fc9636750d2730aa42b3bf217abd1

                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                MD5

                                acabd1f99b9e449d951dea975e1f1ad5

                                SHA1

                                ef545ca153737d6246be2cd3de1b26fb92241327

                                SHA256

                                63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b

                                SHA512

                                e92d6a0f11d2d96267682eed231e8f5580e32df705bc6c0eeb0b6f7fbbe7c56c67267c8e1994c55bb724343e904137808e1fc9636750d2730aa42b3bf217abd1

                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                MD5

                                acabd1f99b9e449d951dea975e1f1ad5

                                SHA1

                                ef545ca153737d6246be2cd3de1b26fb92241327

                                SHA256

                                63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b

                                SHA512

                                e92d6a0f11d2d96267682eed231e8f5580e32df705bc6c0eeb0b6f7fbbe7c56c67267c8e1994c55bb724343e904137808e1fc9636750d2730aa42b3bf217abd1

                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                MD5

                                acabd1f99b9e449d951dea975e1f1ad5

                                SHA1

                                ef545ca153737d6246be2cd3de1b26fb92241327

                                SHA256

                                63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b

                                SHA512

                                e92d6a0f11d2d96267682eed231e8f5580e32df705bc6c0eeb0b6f7fbbe7c56c67267c8e1994c55bb724343e904137808e1fc9636750d2730aa42b3bf217abd1

                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                MD5

                                acabd1f99b9e449d951dea975e1f1ad5

                                SHA1

                                ef545ca153737d6246be2cd3de1b26fb92241327

                                SHA256

                                63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b

                                SHA512

                                e92d6a0f11d2d96267682eed231e8f5580e32df705bc6c0eeb0b6f7fbbe7c56c67267c8e1994c55bb724343e904137808e1fc9636750d2730aa42b3bf217abd1

                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                MD5

                                acabd1f99b9e449d951dea975e1f1ad5

                                SHA1

                                ef545ca153737d6246be2cd3de1b26fb92241327

                                SHA256

                                63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b

                                SHA512

                                e92d6a0f11d2d96267682eed231e8f5580e32df705bc6c0eeb0b6f7fbbe7c56c67267c8e1994c55bb724343e904137808e1fc9636750d2730aa42b3bf217abd1

                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                MD5

                                acabd1f99b9e449d951dea975e1f1ad5

                                SHA1

                                ef545ca153737d6246be2cd3de1b26fb92241327

                                SHA256

                                63e38dc331cd8b202d9109dd5b0e08162673c0661344a06252811d066548c31b

                                SHA512

                                e92d6a0f11d2d96267682eed231e8f5580e32df705bc6c0eeb0b6f7fbbe7c56c67267c8e1994c55bb724343e904137808e1fc9636750d2730aa42b3bf217abd1

                              • memory/384-143-0x0000000140000000-0x000000014002A000-memory.dmp
                                Filesize

                                168KB

                              • memory/384-142-0x0000000140001E00-mapping.dmp
                              • memory/628-182-0x0000000140001E00-mapping.dmp
                              • memory/628-183-0x0000000140000000-0x000000014002A000-memory.dmp
                                Filesize

                                168KB

                              • memory/780-120-0x0000000140000000-0x000000014002A000-memory.dmp
                                Filesize

                                168KB

                              • memory/780-121-0x0000000140001E00-mapping.dmp
                              • memory/780-125-0x0000000140000000-0x000000014002A000-memory.dmp
                                Filesize

                                168KB

                              • memory/1628-192-0x0000000140001E00-mapping.dmp
                              • memory/1628-193-0x0000000140000000-0x000000014002A000-memory.dmp
                                Filesize

                                168KB

                              • memory/1844-148-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/1844-144-0x0000000000000000-mapping.dmp
                              • memory/1844-146-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/1844-147-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/1956-200-0x00000001427491D0-mapping.dmp
                              • memory/2264-150-0x00000001427491D0-mapping.dmp
                              • memory/2464-153-0x0000000140000000-0x000000014002A000-memory.dmp
                                Filesize

                                168KB

                              • memory/2464-152-0x0000000140001E00-mapping.dmp
                              • memory/2812-118-0x0000000140000000-0x000000014274C000-memory.dmp
                                Filesize

                                39.3MB

                              • memory/2812-119-0x00000001427491D0-mapping.dmp
                              • memory/2952-196-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/2952-198-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/2952-197-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/2952-194-0x0000000000000000-mapping.dmp
                              • memory/3016-154-0x0000000000000000-mapping.dmp
                              • memory/3016-156-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3016-157-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3016-158-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3024-188-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3024-187-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3024-186-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3024-184-0x0000000000000000-mapping.dmp
                              • memory/3068-204-0x0000000000000000-mapping.dmp
                              • memory/3068-206-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3068-207-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3068-208-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3232-136-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3232-134-0x0000000000000000-mapping.dmp
                              • memory/3232-137-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3232-138-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3404-115-0x00007FF6CD530000-0x00007FF6CD8FC000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3404-116-0x00007FF6CD530000-0x00007FF6CD8FC000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/3404-117-0x00007FF6CD530000-0x00007FF6CD8FC000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/4080-123-0x0000000000000000-mapping.dmp
                              • memory/4080-126-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/4080-127-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/4080-128-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/4192-130-0x00000001427491D0-mapping.dmp
                              • memory/4244-140-0x00000001427491D0-mapping.dmp
                              • memory/4248-178-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/4248-177-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/4248-174-0x0000000000000000-mapping.dmp
                              • memory/4248-176-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/4332-132-0x0000000140001E00-mapping.dmp
                              • memory/4332-133-0x0000000140000000-0x000000014002A000-memory.dmp
                                Filesize

                                168KB

                              • memory/4404-160-0x00000001427491D0-mapping.dmp
                              • memory/4424-202-0x0000000140001E00-mapping.dmp
                              • memory/4424-203-0x0000000140000000-0x000000014002A000-memory.dmp
                                Filesize

                                168KB

                              • memory/4576-172-0x0000000140001E00-mapping.dmp
                              • memory/4576-173-0x0000000140000000-0x000000014002A000-memory.dmp
                                Filesize

                                168KB

                              • memory/4784-162-0x0000000140001E00-mapping.dmp
                              • memory/4784-163-0x0000000140000000-0x000000014002A000-memory.dmp
                                Filesize

                                168KB

                              • memory/4860-170-0x00000001427491D0-mapping.dmp
                              • memory/4928-167-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/4928-166-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/4928-168-0x00007FF660E40000-0x00007FF66120C000-memory.dmp
                                Filesize

                                3.8MB

                              • memory/4928-164-0x0000000000000000-mapping.dmp
                              • memory/4972-190-0x00000001427491D0-mapping.dmp
                              • memory/5032-180-0x00000001427491D0-mapping.dmp