Analysis

  • max time kernel
    29s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20-02-2023 06:41

General

  • Target

    vocaloid4_4.2.1_setup.exe

  • Size

    49.9MB

  • MD5

    9fa0daa963c93a185fcd38056f1697cf

  • SHA1

    a7eb2b5144f09020e0a526394f52fc20133f4c1f

  • SHA256

    88aadf26c5a6ef8b874d4c0e7ac5250aed2ab2491ee3f3ab0de850cd151f9f5b

  • SHA512

    3e6b8c4581c58c12e71733571186bcc6f0ec078f75d9b5d0b52a69996765b1f6e772f17e0d86052b844953200c7d44fe87567a66aa12bbeb5df364177fe83db7

  • SSDEEP

    786432:THq33j8RcOkoGNrRjJnlF40K+mRLiuRcRWOFZ3N/rSckcVdg+Dp7ZcFz+t:rq3T8iboGNVjJn76rcJVbVLFust

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vocaloid4_4.2.1_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\vocaloid4_4.2.1_setup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\is-HQ4G5.tmp\vocaloid4_4.2.1_setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-HQ4G5.tmp\vocaloid4_4.2.1_setup.tmp" /SL5="$70120,52056677,56832,C:\Users\Admin\AppData\Local\Temp\vocaloid4_4.2.1_setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Program Files (x86)\Vocaloid4FE\vcredist_x86_2008.exe
        "C:\Program Files (x86)\Vocaloid4FE\vcredist_x86_2008.exe" /q
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1016
        • \??\c:\c715240389ce901c2c1fc3d276b90ea0\install.exe
          c:\c715240389ce901c2c1fc3d276b90ea0\.\install.exe /q
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1752
      • C:\Program Files (x86)\Vocaloid4FE\vcredist_x86.exe
        "C:\Program Files (x86)\Vocaloid4FE\vcredist_x86.exe" /q
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1324
        • C:\Program Files (x86)\Vocaloid4FE\vcredist_x86.exe
          "C:\Program Files (x86)\Vocaloid4FE\vcredist_x86.exe" /q -burn.unelevated BurnPipe.{D605994F-A16F-4CD3-A2F8-4E3F04C94B0B} {5A512504-656D-43AB-A31A-7A7C30E2E754} 1324
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1708
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2e4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1532
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1344

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Vocaloid4FE\vcredist_x86.exe
    Filesize

    6.3MB

    MD5

    7f52a19ecaf7db3c163dd164be3e592e

    SHA1

    96b377a27ac5445328cbaae210fc4f0aaa750d3f

    SHA256

    b924ad8062eaf4e70437c8be50fa612162795ff0839479546ce907ffa8d6e386

    SHA512

    60220a7c9de72796bd0d6d44e2b82dbdd9c850cc611e505b7dc0213f745ff1f160b2d826eaf62fd6e07c1a31786a71d83dc6e94389690fd59b895e85aba7444b

  • C:\Program Files (x86)\Vocaloid4FE\vcredist_x86.exe
    Filesize

    6.3MB

    MD5

    7f52a19ecaf7db3c163dd164be3e592e

    SHA1

    96b377a27ac5445328cbaae210fc4f0aaa750d3f

    SHA256

    b924ad8062eaf4e70437c8be50fa612162795ff0839479546ce907ffa8d6e386

    SHA512

    60220a7c9de72796bd0d6d44e2b82dbdd9c850cc611e505b7dc0213f745ff1f160b2d826eaf62fd6e07c1a31786a71d83dc6e94389690fd59b895e85aba7444b

  • C:\Program Files (x86)\Vocaloid4FE\vcredist_x86.exe
    Filesize

    6.3MB

    MD5

    7f52a19ecaf7db3c163dd164be3e592e

    SHA1

    96b377a27ac5445328cbaae210fc4f0aaa750d3f

    SHA256

    b924ad8062eaf4e70437c8be50fa612162795ff0839479546ce907ffa8d6e386

    SHA512

    60220a7c9de72796bd0d6d44e2b82dbdd9c850cc611e505b7dc0213f745ff1f160b2d826eaf62fd6e07c1a31786a71d83dc6e94389690fd59b895e85aba7444b

  • C:\Program Files (x86)\Vocaloid4FE\vcredist_x86_2008.exe
    Filesize

    4.3MB

    MD5

    35da2bf2befd998980a495b6f4f55e60

    SHA1

    470640aa4bb7db8e69196b5edb0010933569e98d

    SHA256

    6b3e4c51c6c0e5f68c8a72b497445af3dbf976394cbb62aa23569065c28deeb6

    SHA512

    bf630667c87b8f10ef85b61f2f379d7ce24124618b999babfec8e2df424eb494b8f1bf0977580810dff5124d4dbdec9539ff53e0dc14625c076fa34dfe44e3f2

  • C:\Program Files (x86)\Vocaloid4FE\vcredist_x86_2008.exe
    Filesize

    4.3MB

    MD5

    35da2bf2befd998980a495b6f4f55e60

    SHA1

    470640aa4bb7db8e69196b5edb0010933569e98d

    SHA256

    6b3e4c51c6c0e5f68c8a72b497445af3dbf976394cbb62aa23569065c28deeb6

    SHA512

    bf630667c87b8f10ef85b61f2f379d7ce24124618b999babfec8e2df424eb494b8f1bf0977580810dff5124d4dbdec9539ff53e0dc14625c076fa34dfe44e3f2

  • C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI2B80.txt
    Filesize

    1KB

    MD5

    fab672e37e0e776f45bafde7ca21d022

    SHA1

    583fb355c1336ececbbdb948e4427d1999bc2ef3

    SHA256

    c1ee64a0c8ce9ad5e2e3fcf17fdab9b46c275ac9c2e04ec09b54b41ff2aefce0

    SHA512

    f5aeeed0eaff8ed41c9f7cffc8ce00356da16ee9de34e445d49236f66ae6d71d5653560091a0c93f79bcacda678ffb6e737768090b90325454c4c533cf1b761e

  • C:\Users\Admin\AppData\Local\Temp\is-HQ4G5.tmp\vocaloid4_4.2.1_setup.tmp
    Filesize

    692KB

    MD5

    9862c8171b748884c7749dd6a67da175

    SHA1

    0524efae9f5dbdde283d43b9e5e1ccb90f75c2c6

    SHA256

    5a972731e0bdac7422e0bf6dcee6a5cd763b065bb2a661420e468ac078b1f5b7

    SHA512

    a0733d42029673ecb07ece32380ec33eeeb38103626ef385afea1d9c09d691e2c8b2101fcc87dbd363eae1fc8990cd7a1956077a7f2d3724e5fee6599372aefc

  • C:\Users\Admin\AppData\Local\Temp\is-HQ4G5.tmp\vocaloid4_4.2.1_setup.tmp
    Filesize

    692KB

    MD5

    9862c8171b748884c7749dd6a67da175

    SHA1

    0524efae9f5dbdde283d43b9e5e1ccb90f75c2c6

    SHA256

    5a972731e0bdac7422e0bf6dcee6a5cd763b065bb2a661420e468ac078b1f5b7

    SHA512

    a0733d42029673ecb07ece32380ec33eeeb38103626ef385afea1d9c09d691e2c8b2101fcc87dbd363eae1fc8990cd7a1956077a7f2d3724e5fee6599372aefc

  • C:\c715240389ce901c2c1fc3d276b90ea0\install.exe
    Filesize

    547KB

    MD5

    4138c31964fbcb3b7418e086933324c3

    SHA1

    97cc6f58fb064ab6c4a2f02fb665fef77d30532f

    SHA256

    b72056fc3df6f46069294c243fe5006879bf4a9d8eef388369a590ca41745f29

    SHA512

    40cf2f35c3a944fca93d58d66465f0308197f5485381ff07d3065e0f59e94fc3834313068e4e5e5da395413ff2d3d1c3ff6fa050f2256e118972bf21a5643557

  • \??\c:\c715240389ce901c2c1fc3d276b90ea0\globdata.ini
    Filesize

    1KB

    MD5

    0a6b586fabd072bd7382b5e24194eac7

    SHA1

    60e3c7215c1a40fbfb3016d52c2de44592f8ca95

    SHA256

    7912e3fcf2698cf4f8625e563cd8215c6668739cae18bd6f27af2d25bec5c951

    SHA512

    b96b0448e9f0e94a7867b6bb103979e9ef2c0e074bcb85988d450d63de6edcf21dc83bb154aafb7de524af3c3734f0bb1ba649db0408612479322e1aa85be9f4

  • \??\c:\c715240389ce901c2c1fc3d276b90ea0\install.ini
    Filesize

    841B

    MD5

    f8f6c0e030cb622f065fe47d61da91d7

    SHA1

    cf6fa99747de8f35c6aea52df234c9c57583baa3

    SHA256

    c16727881c47a40077dc5a1f1ea71cbb28e3f4e156c0ae7074c6d7f5ecece21d

    SHA512

    b70c6d67dac5e6a0dbd17e3bcf570a95914482abad20d0304c02da22231070b4bc887720dbae972bc5066457e1273b68fde0805f1c1791e9466a5ca343485cde

  • \??\c:\c715240389ce901c2c1fc3d276b90ea0\install.res.1033.dll
    Filesize

    85KB

    MD5

    ff6003014eefc9c30abe20e3e1f5fbe8

    SHA1

    4a5bd05f94545f01efc10232385b8fecad300678

    SHA256

    a522c5ea3250cdd538a9ce7b4a06dfd5123e7eb05eef67509f2b975a8e1d3067

    SHA512

    3adc5c705bab7fa7b50517a5eb3301491f5150b56e1088ed436590458e963da204cd1875af75db89742403476a56a94c3f425c05327767bdb4bbee4859667ac2

  • \??\c:\c715240389ce901c2c1fc3d276b90ea0\vc_red.cab
    Filesize

    3.7MB

    MD5

    0ee84ab717bc400c5e96c8d9d329fbb0

    SHA1

    be4ba7bbb068c7256b70f4fd7634eaeb2ad04d0a

    SHA256

    461d575bc1a07f64c14f1da885d2f310bd282cbbedcd0a5cf8ffa7057411805d

    SHA512

    4a6b0619f471a51df09fb6c1eff4ed166cdb7ef57f79ffdf709fa952a7c2a176c338084689c8ace1a94024a24579e9ee0ab6d411c25a1b42b0f517c57749d1a2

  • \??\c:\c715240389ce901c2c1fc3d276b90ea0\vc_red.msi
    Filesize

    222KB

    MD5

    7e641e6a0b456271745c20c3bb8a18f9

    SHA1

    ae6cedcb81dc443611a310140ae4671789dbbf3a

    SHA256

    34c5e7d7ea270ee67f92d34843d89603d6d3b6d9ef5247b43ae3c59c909d380d

    SHA512

    f67d6bf69d094edcc93541332f31b326131ff89672edb30fd349def6952ad8bfd07dc2f0ca5967b48a7589eee5b7a14b9a2c1ebe0cba4ae2324f7957090ea903

  • \Program Files (x86)\Vocaloid4FE\VOCALOID4.exe
    Filesize

    784KB

    MD5

    a8e8c89436b46c098c4e05247b6de607

    SHA1

    b286d1cc60a9c02779219af289882b7b64c68536

    SHA256

    04cc0a073ca1199253d22f473dd9bf8c76dbacd01d80574fc074b0e3c60534ac

    SHA512

    97cb49746fd6002a0c3f84e1fb86099c887f6d138c1180f047ba2878426040898dcdf6c8f1de4b9bfe221e5ba69d772843e06ea39d9049ab7d0133268ab8f16a

  • \Program Files (x86)\Vocaloid4FE\VOCALOID4.exe
    Filesize

    784KB

    MD5

    a8e8c89436b46c098c4e05247b6de607

    SHA1

    b286d1cc60a9c02779219af289882b7b64c68536

    SHA256

    04cc0a073ca1199253d22f473dd9bf8c76dbacd01d80574fc074b0e3c60534ac

    SHA512

    97cb49746fd6002a0c3f84e1fb86099c887f6d138c1180f047ba2878426040898dcdf6c8f1de4b9bfe221e5ba69d772843e06ea39d9049ab7d0133268ab8f16a

  • \Program Files (x86)\Vocaloid4FE\unins000.exe
    Filesize

    703KB

    MD5

    19165445358d2a8b9bcf5c07b3f03f99

    SHA1

    1dd4b7774601487b8c367aabab42d3a8512ede36

    SHA256

    fb557e2e060110a5ea92adb647da13abcf36f4ec7a9fdd887d51319d483aaad9

    SHA512

    f82b6f98af3b6099b447364ca8b27098a2b6024210cb6b993844cfd8609e97d13ee4b9e001329fc0ba08e21cdbf3dd51c341a29ea4df0bea9778fadd9120ff51

  • \Program Files (x86)\Vocaloid4FE\vcredist_x86.exe
    Filesize

    6.3MB

    MD5

    7f52a19ecaf7db3c163dd164be3e592e

    SHA1

    96b377a27ac5445328cbaae210fc4f0aaa750d3f

    SHA256

    b924ad8062eaf4e70437c8be50fa612162795ff0839479546ce907ffa8d6e386

    SHA512

    60220a7c9de72796bd0d6d44e2b82dbdd9c850cc611e505b7dc0213f745ff1f160b2d826eaf62fd6e07c1a31786a71d83dc6e94389690fd59b895e85aba7444b

  • \Program Files (x86)\Vocaloid4FE\vcredist_x86.exe
    Filesize

    6.3MB

    MD5

    7f52a19ecaf7db3c163dd164be3e592e

    SHA1

    96b377a27ac5445328cbaae210fc4f0aaa750d3f

    SHA256

    b924ad8062eaf4e70437c8be50fa612162795ff0839479546ce907ffa8d6e386

    SHA512

    60220a7c9de72796bd0d6d44e2b82dbdd9c850cc611e505b7dc0213f745ff1f160b2d826eaf62fd6e07c1a31786a71d83dc6e94389690fd59b895e85aba7444b

  • \Program Files (x86)\Vocaloid4FE\vcredist_x86_2008.exe
    Filesize

    4.3MB

    MD5

    35da2bf2befd998980a495b6f4f55e60

    SHA1

    470640aa4bb7db8e69196b5edb0010933569e98d

    SHA256

    6b3e4c51c6c0e5f68c8a72b497445af3dbf976394cbb62aa23569065c28deeb6

    SHA512

    bf630667c87b8f10ef85b61f2f379d7ce24124618b999babfec8e2df424eb494b8f1bf0977580810dff5124d4dbdec9539ff53e0dc14625c076fa34dfe44e3f2

  • \Users\Admin\AppData\Local\Temp\is-HQ4G5.tmp\vocaloid4_4.2.1_setup.tmp
    Filesize

    692KB

    MD5

    9862c8171b748884c7749dd6a67da175

    SHA1

    0524efae9f5dbdde283d43b9e5e1ccb90f75c2c6

    SHA256

    5a972731e0bdac7422e0bf6dcee6a5cd763b065bb2a661420e468ac078b1f5b7

    SHA512

    a0733d42029673ecb07ece32380ec33eeeb38103626ef385afea1d9c09d691e2c8b2101fcc87dbd363eae1fc8990cd7a1956077a7f2d3724e5fee6599372aefc

  • \Users\Admin\AppData\Local\Temp\is-LSJ97.tmp\_isetup\_shfoldr.dll
    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-LSJ97.tmp\_isetup\_shfoldr.dll
    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-LSJ97.tmp\bass.dll
    Filesize

    91KB

    MD5

    26295a0baf87955f2e37735af135ca45

    SHA1

    97f468d3ebaca4774ce69f6f55c998b93a912540

    SHA256

    0bd42c13dd0a5c881e80f161f7548b093c4fd99a747c13568af983e2c76cd71a

    SHA512

    6760c5fe3621b1d9c84a5c974c28d796cfba83dba4ff0e9f9eb0ed19cb47a6fc6a1322f58193eb4d638e214f7e61e9543f6f9235c2be8888bcd075fa7650b20a

  • \Users\Admin\AppData\Local\Temp\is-LSJ97.tmp\innocallback.dll
    Filesize

    63KB

    MD5

    1c55ae5ef9980e3b1028447da6105c75

    SHA1

    f85218e10e6aa23b2f5a3ed512895b437e41b45c

    SHA256

    6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

    SHA512

    1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

  • \Users\Admin\AppData\Local\Temp\is-LSJ97.tmp\isgsg.dll
    Filesize

    34KB

    MD5

    09974eaff6defadde38b1328754dbe09

    SHA1

    001cfb5514444188e455b97acc369f037079ca9d

    SHA256

    9eeef28d82fc4db7d1269dfbc0ea282768ce5e2e4e4bdc867d80d6847468dca7

    SHA512

    da29b01ebebb454c004420c6b29bb8dca9fb50554a7a5db30035a5ec458d766049bf5502f708bf7eb210a4f9cbdb308cc0c8dcdad9f745b01a9e4f1455bbc846

  • \Users\Admin\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\.ba1\wixstdba.dll
    Filesize

    126KB

    MD5

    d7bf29763354eda154aad637017b5483

    SHA1

    dfa7d296bfeecde738ef4708aaabfebec6bc1e48

    SHA256

    7f5f8fcfd84132579f07e395e65b44e1b031fe01a299bce0e3dd590131c5cb93

    SHA512

    1c76175732fe68b9b12cb46077daa21e086041adbd65401717a9a1b5f3c516e03c35a90897c22c7281647d6af4a1a5ffb3fbd5706ea376d8f6e574d27396019c

  • \c715240389ce901c2c1fc3d276b90ea0\install.exe
    Filesize

    547KB

    MD5

    4138c31964fbcb3b7418e086933324c3

    SHA1

    97cc6f58fb064ab6c4a2f02fb665fef77d30532f

    SHA256

    b72056fc3df6f46069294c243fe5006879bf4a9d8eef388369a590ca41745f29

    SHA512

    40cf2f35c3a944fca93d58d66465f0308197f5485381ff07d3065e0f59e94fc3834313068e4e5e5da395413ff2d3d1c3ff6fa050f2256e118972bf21a5643557

  • \c715240389ce901c2c1fc3d276b90ea0\install.res.1033.dll
    Filesize

    85KB

    MD5

    ff6003014eefc9c30abe20e3e1f5fbe8

    SHA1

    4a5bd05f94545f01efc10232385b8fecad300678

    SHA256

    a522c5ea3250cdd538a9ce7b4a06dfd5123e7eb05eef67509f2b975a8e1d3067

    SHA512

    3adc5c705bab7fa7b50517a5eb3301491f5150b56e1088ed436590458e963da204cd1875af75db89742403476a56a94c3f425c05327767bdb4bbee4859667ac2

  • memory/1016-80-0x0000000000000000-mapping.dmp
  • memory/1260-55-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1260-66-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1260-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp
    Filesize

    8KB

  • memory/1324-97-0x0000000000000000-mapping.dmp
  • memory/1344-93-0x000007FEFC611000-0x000007FEFC613000-memory.dmp
    Filesize

    8KB

  • memory/1708-102-0x0000000000000000-mapping.dmp
  • memory/1728-65-0x0000000001E00000-0x0000000001E15000-memory.dmp
    Filesize

    84KB

  • memory/1728-67-0x0000000010000000-0x0000000010041000-memory.dmp
    Filesize

    260KB

  • memory/1728-71-0x0000000004780000-0x00000000047B1000-memory.dmp
    Filesize

    196KB

  • memory/1728-77-0x0000000005460000-0x0000000005470000-memory.dmp
    Filesize

    64KB

  • memory/1728-58-0x0000000000000000-mapping.dmp
  • memory/1728-72-0x0000000074AC1000-0x0000000074AC3000-memory.dmp
    Filesize

    8KB

  • memory/1728-73-0x0000000010000000-0x0000000010041000-memory.dmp
    Filesize

    260KB

  • memory/1728-78-0x0000000005460000-0x0000000005470000-memory.dmp
    Filesize

    64KB

  • memory/1752-85-0x0000000000000000-mapping.dmp