Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 18:51
Static task
static1
Behavioral task
behavioral1
Sample
9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exe
Resource
win10v2004-20230220-en
General
-
Target
9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exe
-
Size
522KB
-
MD5
82de6cb1fd75569e56120d75f552afc7
-
SHA1
0891d35dc913073f66c8dc2d9e8ec005cd5897ec
-
SHA256
9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0
-
SHA512
d92caee70bfda7aa75cdb69611ffddd83db93584f15b6b4d0a4b1afd07fa7d040008385612606250653381444e7c27bf1a87920b6f6394538a0ecfebe66d9877
-
SSDEEP
12288:nMrFy90yTi3mouTo45H3isr6Osl3LwNz/sr2v8:2yZT7oUR3isGOslcNz/sr/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr663041.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr663041.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr663041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr663041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr663041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr663041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr663041.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3192-156-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-157-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-159-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-161-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-163-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-165-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-167-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-169-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-171-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-175-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-173-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-177-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-179-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-181-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-183-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-185-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-187-0x0000000004C10000-0x0000000004C20000-memory.dmp family_redline behavioral1/memory/3192-189-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-191-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-193-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-195-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-197-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-199-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-201-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-203-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-205-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-207-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-209-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-211-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-213-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-215-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-217-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-219-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-221-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3192-1074-0x0000000004C10000-0x0000000004C20000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zinj2834.exejr663041.exeku974523.exelr046480.exepid process 4672 zinj2834.exe 4504 jr663041.exe 3192 ku974523.exe 856 lr046480.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr663041.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr663041.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exezinj2834.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zinj2834.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zinj2834.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 796 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1880 3192 WerFault.exe ku974523.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr663041.exeku974523.exelr046480.exepid process 4504 jr663041.exe 4504 jr663041.exe 3192 ku974523.exe 3192 ku974523.exe 856 lr046480.exe 856 lr046480.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr663041.exeku974523.exelr046480.exedescription pid process Token: SeDebugPrivilege 4504 jr663041.exe Token: SeDebugPrivilege 3192 ku974523.exe Token: SeDebugPrivilege 856 lr046480.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exezinj2834.exedescription pid process target process PID 3736 wrote to memory of 4672 3736 9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exe zinj2834.exe PID 3736 wrote to memory of 4672 3736 9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exe zinj2834.exe PID 3736 wrote to memory of 4672 3736 9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exe zinj2834.exe PID 4672 wrote to memory of 4504 4672 zinj2834.exe jr663041.exe PID 4672 wrote to memory of 4504 4672 zinj2834.exe jr663041.exe PID 4672 wrote to memory of 3192 4672 zinj2834.exe ku974523.exe PID 4672 wrote to memory of 3192 4672 zinj2834.exe ku974523.exe PID 4672 wrote to memory of 3192 4672 zinj2834.exe ku974523.exe PID 3736 wrote to memory of 856 3736 9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exe lr046480.exe PID 3736 wrote to memory of 856 3736 9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exe lr046480.exe PID 3736 wrote to memory of 856 3736 9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exe lr046480.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exe"C:\Users\Admin\AppData\Local\Temp\9942047151a8f0711c60725ce8acb67a8fef7fc335113c428a33e301b92e30b0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinj2834.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinj2834.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr663041.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr663041.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku974523.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku974523.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 17244⤵
- Program crash
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr046480.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr046480.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3192 -ip 31921⤵PID:2956
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr046480.exeFilesize
175KB
MD5ee51aec45bb269dc235deb33a5202c64
SHA19e6b7b5e1ae1dec0d3e6ceb7a48d41962765e64b
SHA256c618d15678b9f43e3ad47d6e24de63bb9abdccf87a7a9aa326307e0c50246f72
SHA512544c036876927be3ddf7c44a66cf294694fdc2e753a14f0e2617a7608f60d4b90a7abe43bace05dd88b38f3366e1329da63a29a5401090bfdc55ade1b8c191e6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr046480.exeFilesize
175KB
MD5ee51aec45bb269dc235deb33a5202c64
SHA19e6b7b5e1ae1dec0d3e6ceb7a48d41962765e64b
SHA256c618d15678b9f43e3ad47d6e24de63bb9abdccf87a7a9aa326307e0c50246f72
SHA512544c036876927be3ddf7c44a66cf294694fdc2e753a14f0e2617a7608f60d4b90a7abe43bace05dd88b38f3366e1329da63a29a5401090bfdc55ade1b8c191e6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinj2834.exeFilesize
379KB
MD585c8041b495456eba55de85b572965d8
SHA1d9f005ebca2dea6650ab433b6c7b89baec187f9b
SHA256e6c4f0003cbd0880396a5bfd36194493dc00bb03bf1c76ab5da1c0db12c9a87d
SHA512cbbb634b62c74ed5923908b3c2b96a8e294fd525b5068426ab7d066ce04dd4134cf0c19b1e3daa805025640987c9e2c9e5f6599a0ecb60370f1d9bf7f400dae6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinj2834.exeFilesize
379KB
MD585c8041b495456eba55de85b572965d8
SHA1d9f005ebca2dea6650ab433b6c7b89baec187f9b
SHA256e6c4f0003cbd0880396a5bfd36194493dc00bb03bf1c76ab5da1c0db12c9a87d
SHA512cbbb634b62c74ed5923908b3c2b96a8e294fd525b5068426ab7d066ce04dd4134cf0c19b1e3daa805025640987c9e2c9e5f6599a0ecb60370f1d9bf7f400dae6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr663041.exeFilesize
11KB
MD528b357e4981daf3d446be5ed836fcc62
SHA16266044a8a3c36be470a061b2018b369ee258e6d
SHA2567fb74cdd97c37be1a1aa474755b1ef7026b6da7d54d5010a31f87610a137355b
SHA51229fde37f4b5962ef1a54f5d84bba1c9f8236729d3c4cd85e74a52e646ce466cf340e49764438bf41d35f721bbff77fc1da506ffa101353f6b28829f557b18508
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr663041.exeFilesize
11KB
MD528b357e4981daf3d446be5ed836fcc62
SHA16266044a8a3c36be470a061b2018b369ee258e6d
SHA2567fb74cdd97c37be1a1aa474755b1ef7026b6da7d54d5010a31f87610a137355b
SHA51229fde37f4b5962ef1a54f5d84bba1c9f8236729d3c4cd85e74a52e646ce466cf340e49764438bf41d35f721bbff77fc1da506ffa101353f6b28829f557b18508
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku974523.exeFilesize
294KB
MD57a081a967791e33925d513f3f2d0e128
SHA11c39d446001bcddb3e26c788449ef28bc7d4f3c9
SHA25637a1b87931796bea7f399e210072cea59fd205548975a165f7b0144594dc96c1
SHA51243163bf89390670d72504ffae14adb4777bd89d02d1454a6321c36cd7a720617532cd0a46c2ea0e3fe9d70c5217eaff6d5834d32579b7075f6a93b24d6795590
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku974523.exeFilesize
294KB
MD57a081a967791e33925d513f3f2d0e128
SHA11c39d446001bcddb3e26c788449ef28bc7d4f3c9
SHA25637a1b87931796bea7f399e210072cea59fd205548975a165f7b0144594dc96c1
SHA51243163bf89390670d72504ffae14adb4777bd89d02d1454a6321c36cd7a720617532cd0a46c2ea0e3fe9d70c5217eaff6d5834d32579b7075f6a93b24d6795590
-
memory/856-1085-0x0000000000CA0000-0x0000000000CD2000-memory.dmpFilesize
200KB
-
memory/856-1086-0x0000000005890000-0x00000000058A0000-memory.dmpFilesize
64KB
-
memory/856-1087-0x0000000005890000-0x00000000058A0000-memory.dmpFilesize
64KB
-
memory/3192-191-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-203-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-156-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-157-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-159-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-161-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-163-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-165-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-167-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-169-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-171-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-175-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-173-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-177-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-179-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-181-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-183-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-185-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-187-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/3192-189-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-188-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/3192-154-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/3192-193-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-195-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-197-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-199-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-201-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-155-0x0000000004C20000-0x00000000051C4000-memory.dmpFilesize
5.6MB
-
memory/3192-205-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-207-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-209-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-211-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-213-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-215-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-217-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-219-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-221-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/3192-1064-0x00000000052D0000-0x00000000058E8000-memory.dmpFilesize
6.1MB
-
memory/3192-1065-0x00000000058F0000-0x00000000059FA000-memory.dmpFilesize
1.0MB
-
memory/3192-1066-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/3192-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/3192-1068-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/3192-1070-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/3192-1071-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/3192-1072-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/3192-1074-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/3192-1073-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/3192-1075-0x00000000065C0000-0x0000000006782000-memory.dmpFilesize
1.8MB
-
memory/3192-153-0x0000000000850000-0x000000000089B000-memory.dmpFilesize
300KB
-
memory/3192-1076-0x0000000006790000-0x0000000006CBC000-memory.dmpFilesize
5.2MB
-
memory/3192-1077-0x0000000006DF0000-0x0000000006E66000-memory.dmpFilesize
472KB
-
memory/3192-1078-0x0000000006E80000-0x0000000006ED0000-memory.dmpFilesize
320KB
-
memory/3192-1079-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4504-147-0x0000000000550000-0x000000000055A000-memory.dmpFilesize
40KB