Analysis

  • max time kernel
    88s
  • max time network
    90s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2024, 00:40

General

  • Target

    CoverNetSetup.exe

  • Size

    20.1MB

  • MD5

    8ab580be0e19ff66961756f3047baf66

  • SHA1

    d17fca1e450600b306432b9b3a35e1edafe8312e

  • SHA256

    3caef983c8e1331220e2495323bb5efae4972a0e46cd6c418a9e27eb84c3de70

  • SHA512

    b51c5a50a570bf3cc16f20adf745e3a04be150328ca147e4ac2991e9185d24ae8cb5cccfda96b9951820f669c96419b25f0f6cb0704d41096668ab858e36d1f8

  • SSDEEP

    393216:Pf2GaIDXJOS7FG2GPvvlsoW/Zq//K32Q3qzQ3JtAC2SDnvXQGclKW:n2I5L7FtZqa37azQbACpnvgG/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 25 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CoverNetSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\CoverNetSetup.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:464
    • C:\Windows\System32\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Documents\CoverNet.msi" /q
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3532
    • C:\Program Files (x86)\CoverNet\CoverNet\CoverNet.exe
      "C:\Program Files (x86)\CoverNet\CoverNet\CoverNet.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4532
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cover5.site/buy_vpn.php
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4856
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa73d746f8,0x7ffa73d74708,0x7ffa73d74718
          4⤵
            PID:1724
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,1984649491091820714,11244956481029044417,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:2
            4⤵
              PID:5100
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,1984649491091820714,11244956481029044417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:3
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:5036
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,1984649491091820714,11244956481029044417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:8
              4⤵
                PID:3788
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1984649491091820714,11244956481029044417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                4⤵
                  PID:1720
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1984649491091820714,11244956481029044417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
                  4⤵
                    PID:832
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,1984649491091820714,11244956481029044417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:8
                    4⤵
                      PID:2800
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,1984649491091820714,11244956481029044417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:8
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2512
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1984649491091820714,11244956481029044417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:1
                      4⤵
                        PID:4848
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1984649491091820714,11244956481029044417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:1
                        4⤵
                          PID:4224
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1984649491091820714,11244956481029044417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:1
                          4⤵
                            PID:832
                    • C:\Windows\system32\msiexec.exe
                      C:\Windows\system32\msiexec.exe /V
                      1⤵
                      • Enumerates connected drives
                      • Drops file in Program Files directory
                      • Drops file in Windows directory
                      • Modifies data under HKEY_USERS
                      • Modifies registry class
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:220
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding 7E67C1607D94904FBFC306BCD2A2A8EB
                        2⤵
                        • Loads dropped DLL
                        PID:1000
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:1460
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:1560

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Config.Msi\e578446.rbs

                          Filesize

                          30KB

                          MD5

                          0b320ee534392e8ec49486828ffeba0d

                          SHA1

                          f5aa261a7b067d61a823ab571bcc22f74f8e016a

                          SHA256

                          5ed566bc6e808bfeae11966d996ea27a70db75111ac053c59ea73c64ebe44560

                          SHA512

                          60cc7c8f41511b8d3a67c01e027d7e2002c76992b616352b046b476d2dc5a80169a036e4d0b64d840f2baea0d842e0d12775acb3530387f88d386c22f061700f

                        • C:\Program Files (x86)\CoverNet\CoverNet\CoverNet.exe

                          Filesize

                          6.8MB

                          MD5

                          5fa700a5be957aa978280927bdbf3ac3

                          SHA1

                          4249dfffacc9b507d5f453d46dc7c2268fa50674

                          SHA256

                          b411727e871f962945ec6094546bc3e629e9a5836abd7b4d51263843f1b5fa29

                          SHA512

                          62629de570ddeac354514737ca7253da9ca0b8d8eb7b0bc2060542c549aa94e56e042a125dfe01de78b05629e0481ff48950bb1e9954952def3d9bf408216007

                        • C:\Program Files (x86)\CoverNet\CoverNet\CoverNet.exe.config

                          Filesize

                          542B

                          MD5

                          5610a8e18a32db4ce8edf5319c19e0a0

                          SHA1

                          1314cfc5519f475559b9980fbb2fa3376707ce2b

                          SHA256

                          eb64eafb2d420d0ce49baadcdc94f0306dd8999709a2c787a93c3a12ffab0fd0

                          SHA512

                          3427a6e4e3c8178a101d08e02fa2919c39c415a57041c8ff68b9fde201a9a0a09b43134832adeca356a2b74bc29b3078a49461119ded423b74e29da72949f1cd

                        • C:\Program Files (x86)\CoverNet\CoverNet\Newtonsoft.Json.dll

                          Filesize

                          685KB

                          MD5

                          081d9558bbb7adce142da153b2d5577a

                          SHA1

                          7d0ad03fbda1c24f883116b940717e596073ae96

                          SHA256

                          b624949df8b0e3a6153fdfb730a7c6f4990b6592ee0d922e1788433d276610f3

                          SHA512

                          2fdf035661f349206f58ea1feed8805b7f9517a21f9c113e7301c69de160f184c774350a12a710046e3ff6baa37345d319b6f47fd24fbba4e042d54014bee511

                        • C:\Program Files (x86)\CoverNet\CoverNet\WpfAnimatedGif.dll

                          Filesize

                          41KB

                          MD5

                          f591261c6d85601764b3b8aea8df8b2e

                          SHA1

                          1b16ea63fcb9b60e41f871f428880059c40ded0c

                          SHA256

                          4498d8d1a0549717852507993b7c0350d1da408d22943ed8244d16441abfaf99

                          SHA512

                          05dafbb83d136cd75588f0883497864e942770258461998ab654aa07a1087df590446c28029b6c2fabe27520d47f88eff63ddf80448beaf96887ec5f801544aa

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          4d6e17218d9a99976d1a14c6f6944c96

                          SHA1

                          9e54a19d6c61d99ac8759c5f07b2f0d5faab447f

                          SHA256

                          32e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93

                          SHA512

                          3fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                          Filesize

                          111B

                          MD5

                          285252a2f6327d41eab203dc2f402c67

                          SHA1

                          acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                          SHA256

                          5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                          SHA512

                          11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          73bfc9b475ed334465cd645949d3a861

                          SHA1

                          1c26b63a8c077e18ac4f5abc77b6ce673917aba2

                          SHA256

                          e2e78d17d795ce2f4da18d2d616fde5dc3ed665bf4b8bbcff4781d8723f84351

                          SHA512

                          62001c681201ded9a49091bec265c9d808dc727fdbc030496d130aeda5af58e31a1067ed404e038ec53f2f1754c4ac2b136ee4c450b9fbd647c24d98fc5c43de

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          5a7d8de5fb599fe1409edc5d4fadb91a

                          SHA1

                          0df9776a168158c2858821345112b018ac730ab6

                          SHA256

                          19f8673ce4c852fc78927615b8360f37d2c026ef9d40724629971d88202b05dc

                          SHA512

                          7413d0e82ab89e98c01580e9089bd94480605df0d46ce6e7b5c7d58b2644228d510458f47679dbff0db6fce946dc2e42df946cf11e7ea4d36e4e29314e775051

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                          Filesize

                          24KB

                          MD5

                          c2ef1d773c3f6f230cedf469f7e34059

                          SHA1

                          e410764405adcfead3338c8d0b29371fd1a3f292

                          SHA256

                          185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521

                          SHA512

                          2ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          6752a1d65b201c13b62ea44016eb221f

                          SHA1

                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                          SHA256

                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                          SHA512

                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          10KB

                          MD5

                          b6b6420b5132c5b9a965aa039be5425d

                          SHA1

                          9ca8920f9918f9150bf435c144e8970b11d879c0

                          SHA256

                          b70b7af16342d29a3fc402adc2554bf8be091e09b6537d899450da48ee02c3e3

                          SHA512

                          a6dfb8078d97195a64daca9eadf5044cde210146f246fdb9051278abd4b809915ec537dd2dfab71a8e3f74d95b2d57fdcfeedc909dda0b1bff10f983ac41b815

                        • C:\Users\Admin\Documents\CoverNet.msi

                          Filesize

                          19.1MB

                          MD5

                          091bbb24e566683403474a6fcaeacb11

                          SHA1

                          b53929b32fc44bad6968c85b01a7b561fc5f2f28

                          SHA256

                          f9c8a1cf86202a26ab03ea506f9fbb9e7b4a9ca9818093f1cb36fe451aaa61c9

                          SHA512

                          5ed94cf047dda651b33d619116607a58cac2c2c55e2de6b2a3f4691a21694565ca82053fcc089ea743d3299bb96e67842aa561905adf19694501a75a11f47f5b

                        • C:\Users\Public\Desktop\CoverNet.lnk

                          Filesize

                          1KB

                          MD5

                          0d4bf2056c11c7b5b324b6766d4313b9

                          SHA1

                          fd144f9f5c1d8586ca1b2e3f5e469c58b9472993

                          SHA256

                          5b71b058af1f7c86900d366ff7caa692f0de828cb8ab8be7b0c36cf4ebadfc35

                          SHA512

                          0e1c04ab20b3b636b4cca2f6447476a8536af405b2e0f642ace3cf487018ccf3959e4f4a2820cac4f506ac040b5459f21d32499bdc20f49597dfa410de9ccc9b

                        • C:\Windows\Installer\MSI87CD.tmp

                          Filesize

                          381KB

                          MD5

                          d90ab57e6c584f90fbbea74b566216e3

                          SHA1

                          4616e59aed33848f5870e5e1fe865f932721a162

                          SHA256

                          44ffc4959be0ddb18b02d59c75e78e3e721992e362a2f90cae19adb3271886b9

                          SHA512

                          5b13fe1e34f4ec05ccacaf57fc67f49993e5d950e5396e715686749ddae0b18d5f2d70b3cd3a9ada3389db269213e915f19fd10a54330eaecd765475844e6695

                        • memory/464-192-0x0000000002810000-0x0000000002820000-memory.dmp

                          Filesize

                          64KB

                        • memory/464-194-0x0000000002810000-0x0000000002820000-memory.dmp

                          Filesize

                          64KB

                        • memory/464-191-0x0000000002810000-0x0000000002820000-memory.dmp

                          Filesize

                          64KB

                        • memory/464-199-0x000000001CFB0000-0x000000001D17E000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/464-189-0x0000000002810000-0x0000000002820000-memory.dmp

                          Filesize

                          64KB

                        • memory/464-201-0x00007FFA64800000-0x00007FFA652C1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/464-188-0x00007FFA64800000-0x00007FFA652C1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/464-9-0x000000001CFB0000-0x000000001D17E000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/464-0-0x00007FFA64800000-0x00007FFA652C1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/464-7-0x0000000002810000-0x0000000002820000-memory.dmp

                          Filesize

                          64KB

                        • memory/464-6-0x000000001FD20000-0x000000001FD2E000-memory.dmp

                          Filesize

                          56KB

                        • memory/464-5-0x000000001FD50000-0x000000001FD88000-memory.dmp

                          Filesize

                          224KB

                        • memory/464-4-0x0000000002810000-0x0000000002820000-memory.dmp

                          Filesize

                          64KB

                        • memory/464-3-0x000000001EDD0000-0x000000001EDD8000-memory.dmp

                          Filesize

                          32KB

                        • memory/464-2-0x0000000002810000-0x0000000002820000-memory.dmp

                          Filesize

                          64KB

                        • memory/464-1-0x0000000000C20000-0x000000000203C000-memory.dmp

                          Filesize

                          20.1MB

                        • memory/4532-204-0x0000000005580000-0x00000000055D6000-memory.dmp

                          Filesize

                          344KB

                        • memory/4532-217-0x000000000BC50000-0x000000000BC6C000-memory.dmp

                          Filesize

                          112KB

                        • memory/4532-215-0x000000000AC00000-0x000000000AC10000-memory.dmp

                          Filesize

                          64KB

                        • memory/4532-223-0x000000000E610000-0x000000000E6C0000-memory.dmp

                          Filesize

                          704KB

                        • memory/4532-224-0x000000000EDC0000-0x000000000EDE2000-memory.dmp

                          Filesize

                          136KB

                        • memory/4532-225-0x000000000EDF0000-0x000000000F144000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/4532-226-0x0000000005760000-0x0000000005770000-memory.dmp

                          Filesize

                          64KB

                        • memory/4532-210-0x000000000A440000-0x000000000A44E000-memory.dmp

                          Filesize

                          56KB

                        • memory/4532-209-0x000000000A460000-0x000000000A498000-memory.dmp

                          Filesize

                          224KB

                        • memory/4532-208-0x0000000005760000-0x0000000005770000-memory.dmp

                          Filesize

                          64KB

                        • memory/4532-207-0x0000000005760000-0x0000000005770000-memory.dmp

                          Filesize

                          64KB

                        • memory/4532-293-0x0000000074530000-0x0000000074CE0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/4532-300-0x0000000005760000-0x0000000005770000-memory.dmp

                          Filesize

                          64KB

                        • memory/4532-301-0x0000000005760000-0x0000000005770000-memory.dmp

                          Filesize

                          64KB

                        • memory/4532-206-0x000000000A3C0000-0x000000000A3C8000-memory.dmp

                          Filesize

                          32KB

                        • memory/4532-205-0x0000000005760000-0x0000000005770000-memory.dmp

                          Filesize

                          64KB

                        • memory/4532-203-0x00000000006A0000-0x0000000000D78000-memory.dmp

                          Filesize

                          6.8MB

                        • memory/4532-202-0x0000000074530000-0x0000000074CE0000-memory.dmp

                          Filesize

                          7.7MB