Analysis

  • max time kernel
    145s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 18:26

General

  • Target

    5c7e55c043436e1845a3e5be32fd973110203903d28ebb099f4b16499b016e3c.exe

  • Size

    567KB

  • MD5

    32d6a39b14f2265d88df1ef8f8224cc4

  • SHA1

    2fba8b8adcd691c671a2908bd06d1bd296433397

  • SHA256

    5c7e55c043436e1845a3e5be32fd973110203903d28ebb099f4b16499b016e3c

  • SHA512

    625a4c9765b0d108aa3704c6f82bfd5923cb39d4461970894aa385fa4a390a992b14c13fcbbb5622009198fb6244a759f608877b5b26dd3813335226d19b76e8

  • SSDEEP

    12288:+Mr5y90+sSLvHp9tuRo9T6P56KtkYEuNvcS1WIx1IzJ6mf6T:fyJvpLGo9T6B6KoMcS1WILIzJ6myT

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c7e55c043436e1845a3e5be32fd973110203903d28ebb099f4b16499b016e3c.exe
    "C:\Users\Admin\AppData\Local\Temp\5c7e55c043436e1845a3e5be32fd973110203903d28ebb099f4b16499b016e3c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8889204.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8889204.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9671692.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9671692.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6488196.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6488196.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6595477.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6595477.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1340
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:552
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1660
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1152
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:1512
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:1400
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:884
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:1044
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:964
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {4C649148-A1E3-446F-87D7-063A1F67E241} S-1-5-21-2647223082-2067913677-935928954-1000:BPOQNXYB\Admin:Interactive:[1]
                1⤵
                  PID:1312
                  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                    C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                    2⤵
                    • Executes dropped EXE
                    PID:1808

                Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6595477.exe

                        Filesize

                        271KB

                        MD5

                        611b5729a0140ce0aae113783ddd23b5

                        SHA1

                        7212f728975860eb3adea88a1e204eec6254053a

                        SHA256

                        f440d633c315096baf653debd24217d51258e9070b1c839f48248a8bf20fa7c8

                        SHA512

                        c6ea9da573425088d0e647de6506265c8ec6a96799357bebd8ddc253deea0ab5db1838df774bc1db743469ad3aa219408c786cff8951210755e57b8ae9eb189b

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6595477.exe

                        Filesize

                        271KB

                        MD5

                        611b5729a0140ce0aae113783ddd23b5

                        SHA1

                        7212f728975860eb3adea88a1e204eec6254053a

                        SHA256

                        f440d633c315096baf653debd24217d51258e9070b1c839f48248a8bf20fa7c8

                        SHA512

                        c6ea9da573425088d0e647de6506265c8ec6a96799357bebd8ddc253deea0ab5db1838df774bc1db743469ad3aa219408c786cff8951210755e57b8ae9eb189b

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6595477.exe

                        Filesize

                        271KB

                        MD5

                        611b5729a0140ce0aae113783ddd23b5

                        SHA1

                        7212f728975860eb3adea88a1e204eec6254053a

                        SHA256

                        f440d633c315096baf653debd24217d51258e9070b1c839f48248a8bf20fa7c8

                        SHA512

                        c6ea9da573425088d0e647de6506265c8ec6a96799357bebd8ddc253deea0ab5db1838df774bc1db743469ad3aa219408c786cff8951210755e57b8ae9eb189b

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8889204.exe

                        Filesize

                        307KB

                        MD5

                        13218fdd83b8f8409531021073970bf1

                        SHA1

                        d3c9dfd50b3514af9299737104ba1ed74739a20f

                        SHA256

                        c02b963053610309b43d929345d630c69209623f88334f60b315674d9b2530a7

                        SHA512

                        f647227a177e5931499db2e4d2e70566e0b922ecb9019d143c9892948179c22ad3081bb94a815fbdb4f730e74b45e4419401c22c13ce76c23b1b1ad590868641

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8889204.exe

                        Filesize

                        307KB

                        MD5

                        13218fdd83b8f8409531021073970bf1

                        SHA1

                        d3c9dfd50b3514af9299737104ba1ed74739a20f

                        SHA256

                        c02b963053610309b43d929345d630c69209623f88334f60b315674d9b2530a7

                        SHA512

                        f647227a177e5931499db2e4d2e70566e0b922ecb9019d143c9892948179c22ad3081bb94a815fbdb4f730e74b45e4419401c22c13ce76c23b1b1ad590868641

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9671692.exe

                        Filesize

                        168KB

                        MD5

                        cf8c11c4671cb1444b5af573fd7bfdb5

                        SHA1

                        bec06d74f853abdfc4317549405e5c9c86ce7fea

                        SHA256

                        029c29d47388087fda259ccf27dd943a591d9f68e736b82d89c27b66094a1206

                        SHA512

                        51b43330eff1aa6ce525ddc1948eab0a06e1f7679047976d03f275eaaff9f5203d24623a1e99ba261c8745e44fd58d3f94810dcc7233a42c351ec7909ed703f4

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9671692.exe

                        Filesize

                        168KB

                        MD5

                        cf8c11c4671cb1444b5af573fd7bfdb5

                        SHA1

                        bec06d74f853abdfc4317549405e5c9c86ce7fea

                        SHA256

                        029c29d47388087fda259ccf27dd943a591d9f68e736b82d89c27b66094a1206

                        SHA512

                        51b43330eff1aa6ce525ddc1948eab0a06e1f7679047976d03f275eaaff9f5203d24623a1e99ba261c8745e44fd58d3f94810dcc7233a42c351ec7909ed703f4

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6488196.exe

                        Filesize

                        177KB

                        MD5

                        2ee2b760ae785c66a9af997b1d4d2a12

                        SHA1

                        5497429e36aa12aae8ffc169f75a4f80915b2a93

                        SHA256

                        5c2d1ed766311ae49f0b745f015c24b0c6f1f859699a0c04dac022e1ca7bfd91

                        SHA512

                        8688eaf42d5f9ce3de4131b976d8a8499adc219711928edcf7b89e33234ec6f0d058b1426cf8e01d309d782f69d5adc9f2dc349ba99b745b6ab0eb6e35e5731b

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6488196.exe

                        Filesize

                        177KB

                        MD5

                        2ee2b760ae785c66a9af997b1d4d2a12

                        SHA1

                        5497429e36aa12aae8ffc169f75a4f80915b2a93

                        SHA256

                        5c2d1ed766311ae49f0b745f015c24b0c6f1f859699a0c04dac022e1ca7bfd91

                        SHA512

                        8688eaf42d5f9ce3de4131b976d8a8499adc219711928edcf7b89e33234ec6f0d058b1426cf8e01d309d782f69d5adc9f2dc349ba99b745b6ab0eb6e35e5731b

                      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                        Filesize

                        271KB

                        MD5

                        611b5729a0140ce0aae113783ddd23b5

                        SHA1

                        7212f728975860eb3adea88a1e204eec6254053a

                        SHA256

                        f440d633c315096baf653debd24217d51258e9070b1c839f48248a8bf20fa7c8

                        SHA512

                        c6ea9da573425088d0e647de6506265c8ec6a96799357bebd8ddc253deea0ab5db1838df774bc1db743469ad3aa219408c786cff8951210755e57b8ae9eb189b

                      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                        Filesize

                        271KB

                        MD5

                        611b5729a0140ce0aae113783ddd23b5

                        SHA1

                        7212f728975860eb3adea88a1e204eec6254053a

                        SHA256

                        f440d633c315096baf653debd24217d51258e9070b1c839f48248a8bf20fa7c8

                        SHA512

                        c6ea9da573425088d0e647de6506265c8ec6a96799357bebd8ddc253deea0ab5db1838df774bc1db743469ad3aa219408c786cff8951210755e57b8ae9eb189b

                      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                        Filesize

                        271KB

                        MD5

                        611b5729a0140ce0aae113783ddd23b5

                        SHA1

                        7212f728975860eb3adea88a1e204eec6254053a

                        SHA256

                        f440d633c315096baf653debd24217d51258e9070b1c839f48248a8bf20fa7c8

                        SHA512

                        c6ea9da573425088d0e647de6506265c8ec6a96799357bebd8ddc253deea0ab5db1838df774bc1db743469ad3aa219408c786cff8951210755e57b8ae9eb189b

                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\m6595477.exe

                        Filesize

                        271KB

                        MD5

                        611b5729a0140ce0aae113783ddd23b5

                        SHA1

                        7212f728975860eb3adea88a1e204eec6254053a

                        SHA256

                        f440d633c315096baf653debd24217d51258e9070b1c839f48248a8bf20fa7c8

                        SHA512

                        c6ea9da573425088d0e647de6506265c8ec6a96799357bebd8ddc253deea0ab5db1838df774bc1db743469ad3aa219408c786cff8951210755e57b8ae9eb189b

                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\m6595477.exe

                        Filesize

                        271KB

                        MD5

                        611b5729a0140ce0aae113783ddd23b5

                        SHA1

                        7212f728975860eb3adea88a1e204eec6254053a

                        SHA256

                        f440d633c315096baf653debd24217d51258e9070b1c839f48248a8bf20fa7c8

                        SHA512

                        c6ea9da573425088d0e647de6506265c8ec6a96799357bebd8ddc253deea0ab5db1838df774bc1db743469ad3aa219408c786cff8951210755e57b8ae9eb189b

                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\m6595477.exe

                        Filesize

                        271KB

                        MD5

                        611b5729a0140ce0aae113783ddd23b5

                        SHA1

                        7212f728975860eb3adea88a1e204eec6254053a

                        SHA256

                        f440d633c315096baf653debd24217d51258e9070b1c839f48248a8bf20fa7c8

                        SHA512

                        c6ea9da573425088d0e647de6506265c8ec6a96799357bebd8ddc253deea0ab5db1838df774bc1db743469ad3aa219408c786cff8951210755e57b8ae9eb189b

                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y8889204.exe

                        Filesize

                        307KB

                        MD5

                        13218fdd83b8f8409531021073970bf1

                        SHA1

                        d3c9dfd50b3514af9299737104ba1ed74739a20f

                        SHA256

                        c02b963053610309b43d929345d630c69209623f88334f60b315674d9b2530a7

                        SHA512

                        f647227a177e5931499db2e4d2e70566e0b922ecb9019d143c9892948179c22ad3081bb94a815fbdb4f730e74b45e4419401c22c13ce76c23b1b1ad590868641

                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y8889204.exe

                        Filesize

                        307KB

                        MD5

                        13218fdd83b8f8409531021073970bf1

                        SHA1

                        d3c9dfd50b3514af9299737104ba1ed74739a20f

                        SHA256

                        c02b963053610309b43d929345d630c69209623f88334f60b315674d9b2530a7

                        SHA512

                        f647227a177e5931499db2e4d2e70566e0b922ecb9019d143c9892948179c22ad3081bb94a815fbdb4f730e74b45e4419401c22c13ce76c23b1b1ad590868641

                      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\k9671692.exe

                        Filesize

                        168KB

                        MD5

                        cf8c11c4671cb1444b5af573fd7bfdb5

                        SHA1

                        bec06d74f853abdfc4317549405e5c9c86ce7fea

                        SHA256

                        029c29d47388087fda259ccf27dd943a591d9f68e736b82d89c27b66094a1206

                        SHA512

                        51b43330eff1aa6ce525ddc1948eab0a06e1f7679047976d03f275eaaff9f5203d24623a1e99ba261c8745e44fd58d3f94810dcc7233a42c351ec7909ed703f4

                      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\k9671692.exe

                        Filesize

                        168KB

                        MD5

                        cf8c11c4671cb1444b5af573fd7bfdb5

                        SHA1

                        bec06d74f853abdfc4317549405e5c9c86ce7fea

                        SHA256

                        029c29d47388087fda259ccf27dd943a591d9f68e736b82d89c27b66094a1206

                        SHA512

                        51b43330eff1aa6ce525ddc1948eab0a06e1f7679047976d03f275eaaff9f5203d24623a1e99ba261c8745e44fd58d3f94810dcc7233a42c351ec7909ed703f4

                      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\l6488196.exe

                        Filesize

                        177KB

                        MD5

                        2ee2b760ae785c66a9af997b1d4d2a12

                        SHA1

                        5497429e36aa12aae8ffc169f75a4f80915b2a93

                        SHA256

                        5c2d1ed766311ae49f0b745f015c24b0c6f1f859699a0c04dac022e1ca7bfd91

                        SHA512

                        8688eaf42d5f9ce3de4131b976d8a8499adc219711928edcf7b89e33234ec6f0d058b1426cf8e01d309d782f69d5adc9f2dc349ba99b745b6ab0eb6e35e5731b

                      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\l6488196.exe

                        Filesize

                        177KB

                        MD5

                        2ee2b760ae785c66a9af997b1d4d2a12

                        SHA1

                        5497429e36aa12aae8ffc169f75a4f80915b2a93

                        SHA256

                        5c2d1ed766311ae49f0b745f015c24b0c6f1f859699a0c04dac022e1ca7bfd91

                        SHA512

                        8688eaf42d5f9ce3de4131b976d8a8499adc219711928edcf7b89e33234ec6f0d058b1426cf8e01d309d782f69d5adc9f2dc349ba99b745b6ab0eb6e35e5731b

                      • \Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                        Filesize

                        271KB

                        MD5

                        611b5729a0140ce0aae113783ddd23b5

                        SHA1

                        7212f728975860eb3adea88a1e204eec6254053a

                        SHA256

                        f440d633c315096baf653debd24217d51258e9070b1c839f48248a8bf20fa7c8

                        SHA512

                        c6ea9da573425088d0e647de6506265c8ec6a96799357bebd8ddc253deea0ab5db1838df774bc1db743469ad3aa219408c786cff8951210755e57b8ae9eb189b

                      • \Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                        Filesize

                        271KB

                        MD5

                        611b5729a0140ce0aae113783ddd23b5

                        SHA1

                        7212f728975860eb3adea88a1e204eec6254053a

                        SHA256

                        f440d633c315096baf653debd24217d51258e9070b1c839f48248a8bf20fa7c8

                        SHA512

                        c6ea9da573425088d0e647de6506265c8ec6a96799357bebd8ddc253deea0ab5db1838df774bc1db743469ad3aa219408c786cff8951210755e57b8ae9eb189b

                      • \Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                        Filesize

                        271KB

                        MD5

                        611b5729a0140ce0aae113783ddd23b5

                        SHA1

                        7212f728975860eb3adea88a1e204eec6254053a

                        SHA256

                        f440d633c315096baf653debd24217d51258e9070b1c839f48248a8bf20fa7c8

                        SHA512

                        c6ea9da573425088d0e647de6506265c8ec6a96799357bebd8ddc253deea0ab5db1838df774bc1db743469ad3aa219408c786cff8951210755e57b8ae9eb189b

                      • memory/1096-74-0x0000000000830000-0x0000000000860000-memory.dmp

                        Filesize

                        192KB

                      • memory/1096-75-0x0000000000520000-0x0000000000526000-memory.dmp

                        Filesize

                        24KB

                      • memory/1096-76-0x0000000004C40000-0x0000000004C80000-memory.dmp

                        Filesize

                        256KB

                      • memory/1096-77-0x0000000004C40000-0x0000000004C80000-memory.dmp

                        Filesize

                        256KB

                      • memory/1120-137-0x0000000000400000-0x00000000006C3000-memory.dmp

                        Filesize

                        2.8MB

                      • memory/1120-125-0x00000000002C0000-0x00000000002F5000-memory.dmp

                        Filesize

                        212KB

                      • memory/1340-144-0x0000000000400000-0x00000000006C3000-memory.dmp

                        Filesize

                        2.8MB

                      • memory/1808-143-0x0000000000400000-0x00000000006C3000-memory.dmp

                        Filesize

                        2.8MB

                      • memory/1980-101-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-105-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-87-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-86-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-85-0x0000000000AF0000-0x0000000000B08000-memory.dmp

                        Filesize

                        96KB

                      • memory/1980-84-0x00000000003E0000-0x00000000003FA000-memory.dmp

                        Filesize

                        104KB

                      • memory/1980-113-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-109-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-111-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-114-0x0000000004B20000-0x0000000004B60000-memory.dmp

                        Filesize

                        256KB

                      • memory/1980-107-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-89-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-103-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-97-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-99-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-93-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-95-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB

                      • memory/1980-91-0x0000000000AF0000-0x0000000000B02000-memory.dmp

                        Filesize

                        72KB