Analysis
-
max time kernel
194s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
20-02-2022 07:19
Static task
static1
Behavioral task
behavioral1
Sample
dry.dll
Resource
win7-en-20211208
General
-
Target
dry.dll
-
Size
1.3MB
-
MD5
4bec705de3584b911018c84f31659a17
-
SHA1
b29ff37578ef950b702ec5db59161294c2e1a7b3
-
SHA256
13aa6bed5b3a656b9c86cc2d397f765779f4a7dff49f73d58bd97e11423e0635
-
SHA512
5841f5d288fa4496391fa008326d15ac9abc644c07bf970b20fd1ed2719d5ce01c457d84d17fc8025ff801d7aaec371ee2b6504cabab853d02fb6c1ad49ec423
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2444-137-0x0000000001040000-0x0000000001041000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Magnify.exeSystemPropertiesRemote.exeDevicePairingWizard.exepid process 1324 Magnify.exe 3032 SystemPropertiesRemote.exe 840 DevicePairingWizard.exe -
Loads dropped DLL 3 IoCs
Processes:
Magnify.exeSystemPropertiesRemote.exeDevicePairingWizard.exepid process 1324 Magnify.exe 3032 SystemPropertiesRemote.exe 840 DevicePairingWizard.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Flqldkhbz = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\lWhavolwh\\SystemPropertiesRemote.exe" -
Processes:
DevicePairingWizard.exerundll32.exeMagnify.exeSystemPropertiesRemote.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesRemote.exe -
Drops file in Windows directory 2 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exeMusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 49 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.819657" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4296" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132899917475806202" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4116" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.340137" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2168 rundll32.exe 2168 rundll32.exe 2168 rundll32.exe 2168 rundll32.exe 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 2444 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2444 -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
TiWorker.exedescription pid process Token: SeShutdownPrivilege 2444 Token: SeCreatePagefilePrivilege 2444 Token: SeSecurityPrivilege 2500 TiWorker.exe Token: SeRestorePrivilege 2500 TiWorker.exe Token: SeBackupPrivilege 2500 TiWorker.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2444 wrote to memory of 1760 2444 Magnify.exe PID 2444 wrote to memory of 1760 2444 Magnify.exe PID 2444 wrote to memory of 1324 2444 Magnify.exe PID 2444 wrote to memory of 1324 2444 Magnify.exe PID 2444 wrote to memory of 2128 2444 SystemPropertiesRemote.exe PID 2444 wrote to memory of 2128 2444 SystemPropertiesRemote.exe PID 2444 wrote to memory of 3032 2444 SystemPropertiesRemote.exe PID 2444 wrote to memory of 3032 2444 SystemPropertiesRemote.exe PID 2444 wrote to memory of 3652 2444 DevicePairingWizard.exe PID 2444 wrote to memory of 3652 2444 DevicePairingWizard.exe PID 2444 wrote to memory of 840 2444 DevicePairingWizard.exe PID 2444 wrote to memory of 840 2444 DevicePairingWizard.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dry.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵
-
C:\Users\Admin\AppData\Local\M59GR\Magnify.exeC:\Users\Admin\AppData\Local\M59GR\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesRemote.exeC:\Windows\system32\SystemPropertiesRemote.exe1⤵
-
C:\Users\Admin\AppData\Local\8WP\SystemPropertiesRemote.exeC:\Users\Admin\AppData\Local\8WP\SystemPropertiesRemote.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\d0ghb\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\d0ghb\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\8WP\SYSDM.CPLMD5
1f256eb14504de4fbe00b7c5a2f83621
SHA14585ad24856b0de4fe66564faf0318bb4a9cee09
SHA2569c2ba0dad51ec0dbce8bff2bb9d1970090da472dd65be850fe144f1a96d08398
SHA5128a559d53655f1ac98670308c530f4026e212b1f9983c1b1da2fb7d1287a236ba61197e0988ca087767f5b9df668d1072e931932bfe15383b45069a5cad33aa49
-
C:\Users\Admin\AppData\Local\8WP\SYSDM.CPLMD5
1f256eb14504de4fbe00b7c5a2f83621
SHA14585ad24856b0de4fe66564faf0318bb4a9cee09
SHA2569c2ba0dad51ec0dbce8bff2bb9d1970090da472dd65be850fe144f1a96d08398
SHA5128a559d53655f1ac98670308c530f4026e212b1f9983c1b1da2fb7d1287a236ba61197e0988ca087767f5b9df668d1072e931932bfe15383b45069a5cad33aa49
-
C:\Users\Admin\AppData\Local\8WP\SystemPropertiesRemote.exeMD5
cdce1ee7f316f249a3c20cc7a0197da9
SHA1dadb23af07827758005ec0235ac1573ffcea0da6
SHA2567984e2bff295c8dbcbd3cd296d0741e3a6844b8db9f962abdbc8d333e9a83932
SHA512f1dc529ebfed814adcf3e68041243ee02ba33b56c356a63eba5ef2cb6ede1eda192e03349f6a200d34dfab67263df79cf295be3706f4197b9008ccdc53410c26
-
C:\Users\Admin\AppData\Local\M59GR\Magnify.exeMD5
4029890c147e3b4c6f41dfb5f9834d42
SHA110d08b3f6dabe8171ca2dd52e5737e3402951c75
SHA25657137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d
SHA512dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d
-
C:\Users\Admin\AppData\Local\M59GR\Magnify.exeMD5
4029890c147e3b4c6f41dfb5f9834d42
SHA110d08b3f6dabe8171ca2dd52e5737e3402951c75
SHA25657137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d
SHA512dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d
-
C:\Users\Admin\AppData\Local\M59GR\OLEACC.dllMD5
824a48f12a6f216cf596fc9b3a42d5ea
SHA11ab8c2439de28e14fbd57542fd0011a7214aeff1
SHA2563e2be52ac31603850945aa41d94e0f7191dddd80ac258af7912ec0342937584d
SHA512804620b58df2ae52328a4775c8d5fac3b7ef0afbbe154fbb5a9a427926297d608fb7a87036b563b9eb8990bcff4c3fa2a5dcb7d3b28f10b4cc2eeeb6e52efa15
-
C:\Users\Admin\AppData\Local\M59GR\OLEACC.dllMD5
824a48f12a6f216cf596fc9b3a42d5ea
SHA11ab8c2439de28e14fbd57542fd0011a7214aeff1
SHA2563e2be52ac31603850945aa41d94e0f7191dddd80ac258af7912ec0342937584d
SHA512804620b58df2ae52328a4775c8d5fac3b7ef0afbbe154fbb5a9a427926297d608fb7a87036b563b9eb8990bcff4c3fa2a5dcb7d3b28f10b4cc2eeeb6e52efa15
-
C:\Users\Admin\AppData\Local\d0ghb\DevicePairingWizard.exeMD5
d0e40a5a0c7dad2d6e5040d7fbc37533
SHA1b0eabbd37a97a1abcd90bd56394f5c45585699eb
SHA2562adaf3a5d3fde149626e3fef0e943c7029a135c04688acf357b2d8d04c81981b
SHA5121191c2efcadd53b74d085612025c44b6cd54dd69493632950e30ada650d5ed79e3468c138f389cd3bc21ea103059a63eb38d9d919a62d932a38830c93f57731f
-
C:\Users\Admin\AppData\Local\d0ghb\MFC42u.dllMD5
f66f5430fa8835cfba4cc29c257ae79e
SHA182569d14e2ca89bec1d498fd4facef1e9b01b2dc
SHA2564aec3f85ce5e02811c53c304fa37f51660a9463ce2f20919626d136963bd6c21
SHA512d315feda89d01cf77d4d73fcf9fdfef7c43af1ddc6814d930c04fc32ca276242a580c6f5b9122ef458f91d5c175ce920678f8faa788c3afd6ad696f23ad2cc13
-
C:\Users\Admin\AppData\Local\d0ghb\MFC42u.dllMD5
f66f5430fa8835cfba4cc29c257ae79e
SHA182569d14e2ca89bec1d498fd4facef1e9b01b2dc
SHA2564aec3f85ce5e02811c53c304fa37f51660a9463ce2f20919626d136963bd6c21
SHA512d315feda89d01cf77d4d73fcf9fdfef7c43af1ddc6814d930c04fc32ca276242a580c6f5b9122ef458f91d5c175ce920678f8faa788c3afd6ad696f23ad2cc13
-
memory/840-189-0x000002A6384D0000-0x000002A6384D7000-memory.dmpFilesize
28KB
-
memory/840-182-0x00007FF9BD480000-0x00007FF9BD5D6000-memory.dmpFilesize
1.3MB
-
memory/1324-165-0x00000251580C0000-0x00000251580C7000-memory.dmpFilesize
28KB
-
memory/1324-159-0x00007FF9BD2C0000-0x00007FF9BD410000-memory.dmpFilesize
1.3MB
-
memory/2168-130-0x00007FF9BC9B0000-0x00007FF9BCAFF000-memory.dmpFilesize
1.3MB
-
memory/2168-136-0x0000012AC8500000-0x0000012AC8507000-memory.dmpFilesize
28KB
-
memory/2444-143-0x0000000140000000-0x000000014014F000-memory.dmpFilesize
1.3MB
-
memory/2444-142-0x0000000140000000-0x000000014014F000-memory.dmpFilesize
1.3MB
-
memory/2444-154-0x00007FF9DB380000-0x00007FF9DB390000-memory.dmpFilesize
64KB
-
memory/2444-153-0x00007FF9DA6CA000-0x00007FF9DA6CB000-memory.dmpFilesize
4KB
-
memory/2444-152-0x00007FF9DB42C000-0x00007FF9DB42D000-memory.dmpFilesize
4KB
-
memory/2444-147-0x0000000140000000-0x000000014014F000-memory.dmpFilesize
1.3MB
-
memory/2444-146-0x0000000140000000-0x000000014014F000-memory.dmpFilesize
1.3MB
-
memory/2444-145-0x0000000140000000-0x000000014014F000-memory.dmpFilesize
1.3MB
-
memory/2444-144-0x0000000140000000-0x000000014014F000-memory.dmpFilesize
1.3MB
-
memory/2444-155-0x0000000001020000-0x0000000001027000-memory.dmpFilesize
28KB
-
memory/2444-137-0x0000000001040000-0x0000000001041000-memory.dmpFilesize
4KB
-
memory/2444-138-0x0000000140000000-0x000000014014F000-memory.dmpFilesize
1.3MB
-
memory/2444-141-0x0000000140000000-0x000000014014F000-memory.dmpFilesize
1.3MB
-
memory/2444-140-0x0000000140000000-0x000000014014F000-memory.dmpFilesize
1.3MB
-
memory/2444-139-0x0000000140000000-0x000000014014F000-memory.dmpFilesize
1.3MB
-
memory/3032-178-0x00000290B7E20000-0x00000290B7E27000-memory.dmpFilesize
28KB
-
memory/3032-171-0x00007FF9BC9B0000-0x00007FF9BCB00000-memory.dmpFilesize
1.3MB