Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 23:03

General

  • Target

    5311007a8d4e7b034dbe652619428aefe33bef614cc385d2d4f74f3b7c8cfe88.exe

  • Size

    649KB

  • MD5

    fd77bce75d75a3587ed36155da6888e0

  • SHA1

    b58ad2e1cf5bca700c5ed198acbb197335f3a3fa

  • SHA256

    5311007a8d4e7b034dbe652619428aefe33bef614cc385d2d4f74f3b7c8cfe88

  • SHA512

    ca212402d0e133ca518e5d82a4375f37d2105eb2c234be0b6d571f784c86b597508626cde919c7814d343df717b5af36a4aec79a0e8b5a85420858ce63970a5e

  • SSDEEP

    12288:aJLBZE2PUOGzNmAF6699D52yjS6EGdyafJaSIMPzkqdtRbKdE1J:yLfE2PUOk6U55PS67fcsPR/dz1J

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed By Jamal

C2

mokla.no-ip.biz:1177

Mutex

19e3e31e995d880c12ab2c426a9773dd

Attributes
  • reg_key

    19e3e31e995d880c12ab2c426a9773dd

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 5 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 19 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5311007a8d4e7b034dbe652619428aefe33bef614cc385d2d4f74f3b7c8cfe88.exe
    "C:\Users\Admin\AppData\Local\Temp\5311007a8d4e7b034dbe652619428aefe33bef614cc385d2d4f74f3b7c8cfe88.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Local\Temp\photo.exe
      "C:\Users\Admin\AppData\Local\Temp\photo.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Users\Admin\AppData\Local\Temp\photo.exe
        "C:\Users\Admin\AppData\Local\Temp\photo.exe"
        3⤵
        • Executes dropped EXE
        PID:1124
      • C:\Users\Admin\AppData\Local\Temp\photo.exe
        "C:\Users\Admin\AppData\Local\Temp\photo.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1692
        • C:\Users\Admin\AppData\Roaming\Photo.exe
          "C:\Users\Admin\AppData\Roaming\Photo.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:812
          • C:\Users\Admin\AppData\Roaming\Photo.exe
            "C:\Users\Admin\AppData\Roaming\Photo.exe"
            5⤵
            • Executes dropped EXE
            • Drops startup file
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1832
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Photo.exe" "Photo.exe" ENABLE
              6⤵
              • Modifies Windows Firewall
              PID:1004
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:2024

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\11229560_572310989577683_253860359038300400_n.jpg
    Filesize

    27KB

    MD5

    8cddaeefcd9640152e2f837433dddc7b

    SHA1

    6b818f52c233cd3df538481763aef6185198d864

    SHA256

    729fc68a8a77721b4bd317d523d7e446008b406a986879591097f311c84fa7c9

    SHA512

    559391ff741b204b43d47e483e1cbdc8b404775378069fbf6fd2bb2388f27ebfcadf9676e3d94c65757cc3e0a20007137062f18b7e34379a4cb61dd058ed2f75

  • C:\Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • C:\Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • C:\Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • C:\Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • C:\Users\Admin\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch
    Filesize

    1KB

    MD5

    16c2404c8ff52c76d8d21f42cbe01260

    SHA1

    901a761f6f7b9e3f889d1cfd46ee588b99759523

    SHA256

    9a491c06aa8f06d433ee91c32726d88fa281b1e2ad66d278293a232239b2a188

    SHA512

    8788927f3cb80343cd7391cc90e20c962d68fe2aa5cfa4b69c1838d84509898c9269207eedafc9ae753d475234a55219423adfb97759ffaa453ce9655afefb07

  • C:\Users\Admin\AppData\Roaming\Photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • C:\Users\Admin\AppData\Roaming\Photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • C:\Users\Admin\AppData\Roaming\Photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch
    Filesize

    1KB

    MD5

    63803468077906b283505ca70111d609

    SHA1

    3a83f188b4d71b474a30e0875662fa5aa66b330f

    SHA256

    bd4c159ebea4a2227d7f2ebf88ad27c6a524343f4645355de3b05b47eafbb4d2

    SHA512

    d4a336ed71eb2870cd20bc7489bb73d1080c66eb9bf2fdd8b112c590f621f73175011b11f9c6e97310ac56096e2065b546c5cfe3183dc887ae57b9468017b12f

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch
    Filesize

    1KB

    MD5

    57180dd0ccb7c0f017719e8011a78501

    SHA1

    10922bd9866993d77f6e5dc359e0157d75c630ee

    SHA256

    1b8157312d9d282790a840cf3d976fca685ee5dbcedd49b4cf6c77f05e66c3f5

    SHA512

    ce768bf4ab9212c01ccae063c3ebda472c0fece8484f4aade1ca3562d33a576f87ebea6a98b77a7561028d0795579c558565bd9b50c1af4e8b2996e960292b30

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch
    Filesize

    1KB

    MD5

    63803468077906b283505ca70111d609

    SHA1

    3a83f188b4d71b474a30e0875662fa5aa66b330f

    SHA256

    bd4c159ebea4a2227d7f2ebf88ad27c6a524343f4645355de3b05b47eafbb4d2

    SHA512

    d4a336ed71eb2870cd20bc7489bb73d1080c66eb9bf2fdd8b112c590f621f73175011b11f9c6e97310ac56096e2065b546c5cfe3183dc887ae57b9468017b12f

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch
    Filesize

    1KB

    MD5

    57180dd0ccb7c0f017719e8011a78501

    SHA1

    10922bd9866993d77f6e5dc359e0157d75c630ee

    SHA256

    1b8157312d9d282790a840cf3d976fca685ee5dbcedd49b4cf6c77f05e66c3f5

    SHA512

    ce768bf4ab9212c01ccae063c3ebda472c0fece8484f4aade1ca3562d33a576f87ebea6a98b77a7561028d0795579c558565bd9b50c1af4e8b2996e960292b30

  • \Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Local\Temp\photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Roaming\Photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Roaming\Photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Roaming\Photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Roaming\Photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Roaming\Photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Roaming\Photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Roaming\Photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Roaming\Photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • \Users\Admin\AppData\Roaming\Photo.exe
    Filesize

    564KB

    MD5

    73a787e94c4eda195521bbf9ca5df164

    SHA1

    4027e3eeb2f2549b9054b162dccc39f63c630826

    SHA256

    2d9165cf3577fd8e201af52bc416784ad6ffa8c4e0162fe3f6926aec99da1618

    SHA512

    5695dc574ece58defc76537787186f13021248dace336760b21069ea81f2e698b9877e713b13d6530f891486642b1b90d6bd76fa6dc79695080c976cfe72e557

  • memory/812-122-0x0000000074760000-0x0000000074D0B000-memory.dmp
    Filesize

    5.7MB

  • memory/812-91-0x0000000000000000-mapping.dmp
  • memory/812-99-0x0000000074760000-0x0000000074D0B000-memory.dmp
    Filesize

    5.7MB

  • memory/1004-125-0x0000000000000000-mapping.dmp
  • memory/1692-69-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1692-68-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1692-87-0x0000000074760000-0x0000000074D0B000-memory.dmp
    Filesize

    5.7MB

  • memory/1692-102-0x0000000074760000-0x0000000074D0B000-memory.dmp
    Filesize

    5.7MB

  • memory/1692-73-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1692-71-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1692-78-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1692-80-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1692-75-0x000000000040748E-mapping.dmp
  • memory/1692-74-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1756-54-0x0000000076871000-0x0000000076873000-memory.dmp
    Filesize

    8KB

  • memory/1832-109-0x000000000040748E-mapping.dmp
  • memory/1832-124-0x0000000074760000-0x0000000074D0B000-memory.dmp
    Filesize

    5.7MB

  • memory/1832-127-0x0000000074760000-0x0000000074D0B000-memory.dmp
    Filesize

    5.7MB

  • memory/2036-86-0x0000000074760000-0x0000000074D0B000-memory.dmp
    Filesize

    5.7MB

  • memory/2036-88-0x0000000074760000-0x0000000074D0B000-memory.dmp
    Filesize

    5.7MB

  • memory/2036-57-0x0000000000000000-mapping.dmp