Analysis

  • max time kernel
    51s
  • max time network
    40s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    05-06-2021 11:05

General

  • Target

    SFTPDriveV2.exe

  • Size

    5.1MB

  • MD5

    db66db7b975cedd56a96234798aa7886

  • SHA1

    29eb9ea10b67b57e88ab247b922bf22d5d3017fb

  • SHA256

    d5ab021d5a9422f9e7c827f775f4dfeb359fd68a05b190ad2f3d6a5f4f36574e

  • SHA512

    6b72ab87af0f31788fbb419ef8398b7aeefaa7d78237b5d15f3a814f0f696afd803093d9095cece3b4232e2720b65cc94eff5ac3293da1424d389bae5ecda2b7

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs
  • Registers COM server for autorun 1 TTPs
  • Drops file in Drivers directory 4 IoCs
  • Executes dropped EXE 5 IoCs
  • Modifies Shared Task Scheduler registry keys 2 TTPs
  • Sets service image path in registry 2 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 23 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 44 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SFTPDriveV2.exe
    "C:\Users\Admin\AppData\Local\Temp\SFTPDriveV2.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe
      "C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe" /servicestatus
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      PID:1292
    • C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe
      "C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe" /installdriver
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\SysWOW64\regsvr32.exe" /n /s /i:"cbfsconnect2017-713CC6CE-B3E2-4fd9-838D-E28F558F6866" "C:\Users\Admin\AppData\Local\Temp\cbfsconnect2017-713CC6CE-B3E2-4fd9-838D-E28F558F6866\i386\cbfsconnectMntNtf2017.dll"
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:2084
    • C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe
      "C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe" /unregisterservice
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      PID:1108
    • C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe
      "C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe" /registerservice
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      PID:1372
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{76208717-e7e0-2442-931e-65755dd9e33e}\vpnpbus.inf" "9" "457c6404f" "0000000000000164" "WinSta0\Default" "0000000000000170" "208" "c:\users\admin\appdata\local\temp\cbfsconnect2017-713cc6ce-b3e2-4fd9-838d-e28f558f6866\x64"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:2364
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "11" "ROOT\SYSTEM\0001" "C:\Windows\INF\oem2.inf" "vpnpbus.inf:3beb73af39d90f0b:VBus_Device:1.0.0.1:root\callbacktech_virtual_pnp_bus," "457c6404f" "0000000000000168"
      2⤵
      • Drops file in Drivers directory
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3576
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
    1⤵
    • Checks SCSI registry key(s)
    • Modifies data under HKEY_USERS
    PID:3280
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2736
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:3544
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4256
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4332
  • C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe
    "C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4784

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

4
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

6
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~1\NSOFTW~1\SFTPDR~1\drivers\cbfsconnect.cab
    MD5

    871a98d031528cbb6a831b891e06b070

    SHA1

    0677de64852cd2178f0470d560ed74b3c670e48c

    SHA256

    6a5bc648abf2840646ed0c6905deeb59f293cf7e5c273dbead149ce3e0c9f98e

    SHA512

    a59e526f76e7dd5a5813bdb3a28e639876d9a17632854e4d33ce5e753b5eab9a964b380de493b3fcc7888454ab328f053352b01ae68e8bf5998f66e8be69a7e8

  • C:\Program Files\nsoftware\SFTP Drive V2\CBFSConnect2017Net.dll
    MD5

    79a2635eb952471985787466e1cc2019

    SHA1

    0cab35def9727819f89b54f7d8fcbcdf06e09efa

    SHA256

    23d5f43596bdc944e54592363a3e00b8f9376b084208a7a2cd6859280a83fbaa

    SHA512

    0c060482cb0d721bf1661289f72533098c01be4567e6e2162b137538c2173eef2d7f47b7abef05212ac158396a7dfc38355f895c24d2a97806abdc1127f32ff5

  • C:\Program Files\nsoftware\SFTP Drive V2\CBFSConnect2017Net.dll
    MD5

    79a2635eb952471985787466e1cc2019

    SHA1

    0cab35def9727819f89b54f7d8fcbcdf06e09efa

    SHA256

    23d5f43596bdc944e54592363a3e00b8f9376b084208a7a2cd6859280a83fbaa

    SHA512

    0c060482cb0d721bf1661289f72533098c01be4567e6e2162b137538c2173eef2d7f47b7abef05212ac158396a7dfc38355f895c24d2a97806abdc1127f32ff5

  • C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe
    MD5

    96b66b19b3bafb39b905e12925c9c64f

    SHA1

    c4f22cb84c84bbb904b9bc168eee137e16b0a162

    SHA256

    2bd7edd72948743091d2d442a4fb044716bc187f2612a3033b222d302d0f1c66

    SHA512

    38e72d0a386c4e862be66a80cfa2f2d3ca2b3c0e1ce371339d2d805f9e5a957ffec6e0046991328c0516cdcf466a5e526272491e926c3c9ba2f502ec052c947c

  • C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe
    MD5

    96b66b19b3bafb39b905e12925c9c64f

    SHA1

    c4f22cb84c84bbb904b9bc168eee137e16b0a162

    SHA256

    2bd7edd72948743091d2d442a4fb044716bc187f2612a3033b222d302d0f1c66

    SHA512

    38e72d0a386c4e862be66a80cfa2f2d3ca2b3c0e1ce371339d2d805f9e5a957ffec6e0046991328c0516cdcf466a5e526272491e926c3c9ba2f502ec052c947c

  • C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe
    MD5

    96b66b19b3bafb39b905e12925c9c64f

    SHA1

    c4f22cb84c84bbb904b9bc168eee137e16b0a162

    SHA256

    2bd7edd72948743091d2d442a4fb044716bc187f2612a3033b222d302d0f1c66

    SHA512

    38e72d0a386c4e862be66a80cfa2f2d3ca2b3c0e1ce371339d2d805f9e5a957ffec6e0046991328c0516cdcf466a5e526272491e926c3c9ba2f502ec052c947c

  • C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe
    MD5

    96b66b19b3bafb39b905e12925c9c64f

    SHA1

    c4f22cb84c84bbb904b9bc168eee137e16b0a162

    SHA256

    2bd7edd72948743091d2d442a4fb044716bc187f2612a3033b222d302d0f1c66

    SHA512

    38e72d0a386c4e862be66a80cfa2f2d3ca2b3c0e1ce371339d2d805f9e5a957ffec6e0046991328c0516cdcf466a5e526272491e926c3c9ba2f502ec052c947c

  • C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe.config
    MD5

    e6f3c83d65e861edf5ea88399f57db0e

    SHA1

    a85ba91cf1246b0ee31f59d4f97f3c2f1c38f820

    SHA256

    2c1b6cb5e2d4b40f9040be9cb8e58190d040e0cfadf4fb1e94ebc808ab77313c

    SHA512

    5583c4c03dc661469a63249c2951f142474714a17dc876fb17240205e89347951880ed7964d5a568eca61a236e6f59ca3472fb56340137746eaf4a4e2fe635ba

  • C:\Program Files\nsoftware\SFTP Drive V2\SFTPDrive.exe.config
    MD5

    e6f3c83d65e861edf5ea88399f57db0e

    SHA1

    a85ba91cf1246b0ee31f59d4f97f3c2f1c38f820

    SHA256

    2c1b6cb5e2d4b40f9040be9cb8e58190d040e0cfadf4fb1e94ebc808ab77313c

    SHA512

    5583c4c03dc661469a63249c2951f142474714a17dc876fb17240205e89347951880ed7964d5a568eca61a236e6f59ca3472fb56340137746eaf4a4e2fe635ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_E6095CD2AECC9011BCD0D7B421356B17
    MD5

    0758ad84df67e41fb650b810bf467c47

    SHA1

    92713ef4170245f8f4e7c95f3091d2985c99c3dc

    SHA256

    98184fe373ac03835d384e4e02107f0d04804e56e2d38b7baba3a23b56cac09a

    SHA512

    02199dd5ac8c767fcc4f30657e7e3ae4c9c12c655d9a953bc18cd6406993ad6e731a7ff38f9ef6b74de096bf1ff7bdabdc5b30f85bd6fc560375681e24ab19ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    129fc8582da7d3179e3041b6cd3f0f19

    SHA1

    70cb5d4acf946b6fd199349985841789d0a5808e

    SHA256

    2adab5b9fd42d05e9fd017ae0756fb09b8ed8b26d58928c378b4d5bf9c6c220b

    SHA512

    df1b404d220dbccc6982deb98993aca26156f74b6c5c4ced3ac821df018324043f72d3751b77667373660bfc4840be63ab68aa78e649ab99b8d898253daf9541

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D7833C286363AD25C70511661A83D581_E6FF3C50997CF27C5DC93B810D33064E
    MD5

    bd1a8845c02b8b85eb94eb98f0a59ab4

    SHA1

    8c63f793b749ccbdbd8dc17d38ac80e05e71ba35

    SHA256

    05da201f2f1003b29d79eb8cd76265898d19b49b1d5a14247aeccc7e6f5ab04d

    SHA512

    f5718f1896c25ad08c991c237993853c875e7b5a941e44a9b1c8a648baea63be626dbb25f69bfb5fac45e6023dbe03337342f0e8cef34ed96e92897feeda8e08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_E6095CD2AECC9011BCD0D7B421356B17
    MD5

    abce2a94adf259d2f7753acc96e88f96

    SHA1

    fc635088c87928d3665625886d89722652d056b5

    SHA256

    ba5efe21e9c50cdf62112d96774126502bad886383d41dfa1048852b2868e2a2

    SHA512

    ec5e4d9f7370a05adab6560f6035f859822c74209288154b8aa8c9e66755ac4d74dec973490c7737b9adfd8182dee2ce3dbfdb35a359b418057ce7b34a249268

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    376ee097d95513d5d74ec92682d2b0a5

    SHA1

    4c62a876d51eebd77616a7b3ec20830fb843f0f5

    SHA256

    2e052a66ec0f0adfae8642952723d643c3e8ff0e22268c26a728dcf217a42531

    SHA512

    9c52a51536d9988c88fae756495a087ed45fb279e5c69fe988f4973876e27c40c120c3c2cca39cc71088af32e87e5d47e9567659a1c9c8d44e0d4a104e8e66a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D7833C286363AD25C70511661A83D581_E6FF3C50997CF27C5DC93B810D33064E
    MD5

    0ede597dfa5229a61879607cb4d91208

    SHA1

    46d5dd1db513010f07c8d229866d8f8cbd596787

    SHA256

    c0656f35a11a4aefb32277910b4eb4ea6cf1b915543abf7f49fdc60a955c7683

    SHA512

    ec865c0d0934ebac601dd1237d9fe06e3e8860eb9c24e69cf43d4837c2f26d34ff0a427529a89c4bf76b0ee363fba63d81b5efe7e2d52ed4555683fed8c9a746

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\SFTPDrive.exe.log
    MD5

    e2a753c443c5b4c0b5910c7c1b7583ab

    SHA1

    febc279d2bfb1c88d071d0c693b9ba6876f7f41d

    SHA256

    4e792cb1a51c5e590e74a61541bd12f984f9acbe0e86d4eca459c1922d3a55b1

    SHA512

    24184b49e694fbb3873e008122fb4ce7975d9ffb262e4c5cf39d61109a5df5c207359481d92a2b6a8d18d8c00b0df04ecf5cbdbe7d2b8d17550461e15d60682f

  • C:\Users\Admin\AppData\Local\Temp\cbfsconnect2017-713CC6CE-B3E2-4fd9-838D-E28F558F6866\i386\cbfsconnectMntNtf2017.dll
    MD5

    7b06af12e7b171e132198091e0a71105

    SHA1

    586a8c4d79aac2a3351504eb2020f0393c4e8051

    SHA256

    4af96af83753227aa5293294c87548f2f40db277a9d6717b173befcd8518fc04

    SHA512

    d6802dbe5d72a0fbef52f7d6ec8fefa0243319898fc854337adf8dd315cd97117036c43db00e1fb12a3136dbec4c70daedcdb4c1a0f1f31a0a752fc4181910de

  • C:\Users\Admin\AppData\Local\Temp\{76208717-e7e0-2442-931e-65755dd9e33e}\vpnpbus.inf
    MD5

    1d992ea7dd85d14453fce31efccd880b

    SHA1

    158f0140bb1511d22845177f7995cc2a153be819

    SHA256

    586cc28d61aed1819c321014fa757623693d49b327ecbae3bd77d288850de84f

    SHA512

    435b5a496c452082ba8782c4d299e8d0d262b28c98356170f5eba5db0d6bdef79037781a9d862d0dad5620deb3310d96f9f4ce62feff705985abf1f6715e5215

  • C:\Users\Admin\AppData\Local\Temp\{76208~1\vpnpbus.cat
    MD5

    ced649391fe0a32c03431232b2977093

    SHA1

    ca9222788f54fa2a20887328cc67ae70f413b371

    SHA256

    5e52759fdf1ca8b8304e99b2b5b6089043327afe788a66d876969050848761c4

    SHA512

    42a6a8cc63782d3b10b68f38787a4fc9c4df6581bd0ce2a04baeaf4d52fa4a27db744d2d5c507a72291075c913431cbc365794b987347c505cea76ba3c5c094e

  • C:\Users\Admin\AppData\Local\Temp\{76208~1\vpnpbus.sys
    MD5

    6c45c51740f2d799881352f2af26dcbb

    SHA1

    db68498d9ce9049a32158dc6872f753d87ea688c

    SHA256

    fada3c8c84d16decdc2b663aba0b69f9b00fafe134c7e0edf609fc93b9ccd057

    SHA512

    6555ef4bf70fdb21fc97e0dc0bb9d0baa23a8d364d149c06351fb53551166721e8fdb85ea0b9632575e995d4a677c292aa438a7aef836be9c8c0c5e3f9e2d3ee

  • C:\Windows\INF\oem2.PNF
    MD5

    8b89643c724409bc3b491947039c4a87

    SHA1

    4ccdee9b04bc5ae18a0cf64a06f647bd4493d67e

    SHA256

    a0565524ca0aef6003a102a84e54d9590fe9dba2c15da0e2c1fac70b7b87d617

    SHA512

    c3d4f08b24772f4153130900e270ff8586d5ad5ae208c9e764910f72460a692eee7ce38bf4131e6083b810c1978e3d45400119158a1ae78d5c22234e7baf7f42

  • C:\Windows\INF\oem2.inf
    MD5

    1d992ea7dd85d14453fce31efccd880b

    SHA1

    158f0140bb1511d22845177f7995cc2a153be819

    SHA256

    586cc28d61aed1819c321014fa757623693d49b327ecbae3bd77d288850de84f

    SHA512

    435b5a496c452082ba8782c4d299e8d0d262b28c98356170f5eba5db0d6bdef79037781a9d862d0dad5620deb3310d96f9f4ce62feff705985abf1f6715e5215

  • C:\Windows\System32\DRIVER~1\FILERE~1\VPNPBU~1.INF\vpnpbus.sys
    MD5

    6c45c51740f2d799881352f2af26dcbb

    SHA1

    db68498d9ce9049a32158dc6872f753d87ea688c

    SHA256

    fada3c8c84d16decdc2b663aba0b69f9b00fafe134c7e0edf609fc93b9ccd057

    SHA512

    6555ef4bf70fdb21fc97e0dc0bb9d0baa23a8d364d149c06351fb53551166721e8fdb85ea0b9632575e995d4a677c292aa438a7aef836be9c8c0c5e3f9e2d3ee

  • C:\Windows\System32\DriverStore\FileRepository\vpnpbus.inf_amd64_906b366afee91232\vpnpbus.cat
    MD5

    ced649391fe0a32c03431232b2977093

    SHA1

    ca9222788f54fa2a20887328cc67ae70f413b371

    SHA256

    5e52759fdf1ca8b8304e99b2b5b6089043327afe788a66d876969050848761c4

    SHA512

    42a6a8cc63782d3b10b68f38787a4fc9c4df6581bd0ce2a04baeaf4d52fa4a27db744d2d5c507a72291075c913431cbc365794b987347c505cea76ba3c5c094e

  • C:\Windows\System32\DriverStore\FileRepository\vpnpbus.inf_amd64_906b366afee91232\vpnpbus.inf
    MD5

    1d992ea7dd85d14453fce31efccd880b

    SHA1

    158f0140bb1511d22845177f7995cc2a153be819

    SHA256

    586cc28d61aed1819c321014fa757623693d49b327ecbae3bd77d288850de84f

    SHA512

    435b5a496c452082ba8782c4d299e8d0d262b28c98356170f5eba5db0d6bdef79037781a9d862d0dad5620deb3310d96f9f4ce62feff705985abf1f6715e5215

  • \Program Files\nsoftware\SFTP Drive V2\CBFSConnect2017Net.dll
    MD5

    79a2635eb952471985787466e1cc2019

    SHA1

    0cab35def9727819f89b54f7d8fcbcdf06e09efa

    SHA256

    23d5f43596bdc944e54592363a3e00b8f9376b084208a7a2cd6859280a83fbaa

    SHA512

    0c060482cb0d721bf1661289f72533098c01be4567e6e2162b137538c2173eef2d7f47b7abef05212ac158396a7dfc38355f895c24d2a97806abdc1127f32ff5

  • \Program Files\nsoftware\SFTP Drive V2\CBFSConnect2017Net.dll
    MD5

    79a2635eb952471985787466e1cc2019

    SHA1

    0cab35def9727819f89b54f7d8fcbcdf06e09efa

    SHA256

    23d5f43596bdc944e54592363a3e00b8f9376b084208a7a2cd6859280a83fbaa

    SHA512

    0c060482cb0d721bf1661289f72533098c01be4567e6e2162b137538c2173eef2d7f47b7abef05212ac158396a7dfc38355f895c24d2a97806abdc1127f32ff5

  • \Program Files\nsoftware\SFTP Drive V2\CBFSConnect2017Net.dll
    MD5

    79a2635eb952471985787466e1cc2019

    SHA1

    0cab35def9727819f89b54f7d8fcbcdf06e09efa

    SHA256

    23d5f43596bdc944e54592363a3e00b8f9376b084208a7a2cd6859280a83fbaa

    SHA512

    0c060482cb0d721bf1661289f72533098c01be4567e6e2162b137538c2173eef2d7f47b7abef05212ac158396a7dfc38355f895c24d2a97806abdc1127f32ff5

  • \Program Files\nsoftware\SFTP Drive V2\CBFSConnect2017Net.dll
    MD5

    79a2635eb952471985787466e1cc2019

    SHA1

    0cab35def9727819f89b54f7d8fcbcdf06e09efa

    SHA256

    23d5f43596bdc944e54592363a3e00b8f9376b084208a7a2cd6859280a83fbaa

    SHA512

    0c060482cb0d721bf1661289f72533098c01be4567e6e2162b137538c2173eef2d7f47b7abef05212ac158396a7dfc38355f895c24d2a97806abdc1127f32ff5

  • \Program Files\nsoftware\SFTP Drive V2\CBFSConnect2017Net.dll
    MD5

    79a2635eb952471985787466e1cc2019

    SHA1

    0cab35def9727819f89b54f7d8fcbcdf06e09efa

    SHA256

    23d5f43596bdc944e54592363a3e00b8f9376b084208a7a2cd6859280a83fbaa

    SHA512

    0c060482cb0d721bf1661289f72533098c01be4567e6e2162b137538c2173eef2d7f47b7abef05212ac158396a7dfc38355f895c24d2a97806abdc1127f32ff5

  • \Program Files\nsoftware\SFTP Drive V2\CBFSConnect2017Net.dll
    MD5

    79a2635eb952471985787466e1cc2019

    SHA1

    0cab35def9727819f89b54f7d8fcbcdf06e09efa

    SHA256

    23d5f43596bdc944e54592363a3e00b8f9376b084208a7a2cd6859280a83fbaa

    SHA512

    0c060482cb0d721bf1661289f72533098c01be4567e6e2162b137538c2173eef2d7f47b7abef05212ac158396a7dfc38355f895c24d2a97806abdc1127f32ff5

  • \Users\Admin\AppData\Local\Temp\cbfsconnect2017-713CC6CE-B3E2-4fd9-838D-E28F558F6866\i386\cbfsconnectMntNtf2017.dll
    MD5

    7b06af12e7b171e132198091e0a71105

    SHA1

    586a8c4d79aac2a3351504eb2020f0393c4e8051

    SHA256

    4af96af83753227aa5293294c87548f2f40db277a9d6717b173befcd8518fc04

    SHA512

    d6802dbe5d72a0fbef52f7d6ec8fefa0243319898fc854337adf8dd315cd97117036c43db00e1fb12a3136dbec4c70daedcdb4c1a0f1f31a0a752fc4181910de

  • \Users\Admin\AppData\Local\Temp\cbfsconnect2017-713CC6CE-B3E2-4fd9-838D-E28F558F6866\x64\cbfsconnectMntNtf2017.dll
    MD5

    b4c2ac9366744b2ecf1b76e8e187e6a3

    SHA1

    cbca8984637e75af2c4617a6bcb406c5780f1225

    SHA256

    a338ac7b7574dc09c23c0897b724c13299d8bb6ff8bc6ffa143ae595f0f99ab8

    SHA512

    6c3ce449cd2818c29d56a21734a2261153c52f50a188dcd81b32d9eca16edf40410874dfe47cbb27fd04c23c5b4fab87666ae56eaa3be3c41a009b63603faaf7

  • \Users\Admin\AppData\Local\Temp\cbfsconnect2017-713CC6CE-B3E2-4fd9-838D-E28F558F6866\x64\cbfsconnectNetRdr2017.dll
    MD5

    7fa7cf1552b17c1a48f6c6ac63d0cd88

    SHA1

    f273445050471124c0d8269ee13a7f54055943ba

    SHA256

    beea84f74e278e94521c396cd8e18024732cb5a493da602fb5a07b5909ca03f1

    SHA512

    190da7a6d7f16b3bf35636922eb2783c68b7b3da53629b26d19ce7a6d62d4012d6f336293692fd9016ad5bc1183a6690b0dc5fd41a560c9a6f7ec27dfdb29b84

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\InstallOptions.dll
    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\SetCursor.dll
    MD5

    078b8542b9dd7b835ed5b1aeb6ee203e

    SHA1

    a816c5662a1f93a6d0682e62e3987927508215c9

    SHA256

    1d37bda5c4ff2b0cbe91529e7d0e8bcd4bc14d92dc39289d6f597249058547f4

    SHA512

    2955e97d8b08ba63ae9900ffc66fd2a2bbc5fdf8347e6688f80d91205d3f31842b153e8b9f769bf9649ebb07c4fd35772371d8c817c9cf96126ec87e8eb47731

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\SetCursor.dll
    MD5

    078b8542b9dd7b835ed5b1aeb6ee203e

    SHA1

    a816c5662a1f93a6d0682e62e3987927508215c9

    SHA256

    1d37bda5c4ff2b0cbe91529e7d0e8bcd4bc14d92dc39289d6f597249058547f4

    SHA512

    2955e97d8b08ba63ae9900ffc66fd2a2bbc5fdf8347e6688f80d91205d3f31842b153e8b9f769bf9649ebb07c4fd35772371d8c817c9cf96126ec87e8eb47731

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\SetCursor.dll
    MD5

    078b8542b9dd7b835ed5b1aeb6ee203e

    SHA1

    a816c5662a1f93a6d0682e62e3987927508215c9

    SHA256

    1d37bda5c4ff2b0cbe91529e7d0e8bcd4bc14d92dc39289d6f597249058547f4

    SHA512

    2955e97d8b08ba63ae9900ffc66fd2a2bbc5fdf8347e6688f80d91205d3f31842b153e8b9f769bf9649ebb07c4fd35772371d8c817c9cf96126ec87e8eb47731

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\SetCursor.dll
    MD5

    078b8542b9dd7b835ed5b1aeb6ee203e

    SHA1

    a816c5662a1f93a6d0682e62e3987927508215c9

    SHA256

    1d37bda5c4ff2b0cbe91529e7d0e8bcd4bc14d92dc39289d6f597249058547f4

    SHA512

    2955e97d8b08ba63ae9900ffc66fd2a2bbc5fdf8347e6688f80d91205d3f31842b153e8b9f769bf9649ebb07c4fd35772371d8c817c9cf96126ec87e8eb47731

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\SetCursor.dll
    MD5

    078b8542b9dd7b835ed5b1aeb6ee203e

    SHA1

    a816c5662a1f93a6d0682e62e3987927508215c9

    SHA256

    1d37bda5c4ff2b0cbe91529e7d0e8bcd4bc14d92dc39289d6f597249058547f4

    SHA512

    2955e97d8b08ba63ae9900ffc66fd2a2bbc5fdf8347e6688f80d91205d3f31842b153e8b9f769bf9649ebb07c4fd35772371d8c817c9cf96126ec87e8eb47731

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\SetCursor.dll
    MD5

    078b8542b9dd7b835ed5b1aeb6ee203e

    SHA1

    a816c5662a1f93a6d0682e62e3987927508215c9

    SHA256

    1d37bda5c4ff2b0cbe91529e7d0e8bcd4bc14d92dc39289d6f597249058547f4

    SHA512

    2955e97d8b08ba63ae9900ffc66fd2a2bbc5fdf8347e6688f80d91205d3f31842b153e8b9f769bf9649ebb07c4fd35772371d8c817c9cf96126ec87e8eb47731

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\SetCursor.dll
    MD5

    078b8542b9dd7b835ed5b1aeb6ee203e

    SHA1

    a816c5662a1f93a6d0682e62e3987927508215c9

    SHA256

    1d37bda5c4ff2b0cbe91529e7d0e8bcd4bc14d92dc39289d6f597249058547f4

    SHA512

    2955e97d8b08ba63ae9900ffc66fd2a2bbc5fdf8347e6688f80d91205d3f31842b153e8b9f769bf9649ebb07c4fd35772371d8c817c9cf96126ec87e8eb47731

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\SetCursor.dll
    MD5

    078b8542b9dd7b835ed5b1aeb6ee203e

    SHA1

    a816c5662a1f93a6d0682e62e3987927508215c9

    SHA256

    1d37bda5c4ff2b0cbe91529e7d0e8bcd4bc14d92dc39289d6f597249058547f4

    SHA512

    2955e97d8b08ba63ae9900ffc66fd2a2bbc5fdf8347e6688f80d91205d3f31842b153e8b9f769bf9649ebb07c4fd35772371d8c817c9cf96126ec87e8eb47731

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\StartMenu.dll
    MD5

    a4173b381625f9f12aadb4e1cdaefdb8

    SHA1

    cf1680c2bc970d5675adbf5e89292a97e6724713

    SHA256

    7755ff2707ca19344d489a5acec02d9e310425fa6e100d2f13025761676b875b

    SHA512

    fcac79d42862da6bdd3ecad9d887a975cdff2301a8322f321be58f754a26b27077b452faa4751bbd09cd3371b4afce65255fbbb443e2c93dd2cba0ba652f4a82

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\StartMenu.dll
    MD5

    a4173b381625f9f12aadb4e1cdaefdb8

    SHA1

    cf1680c2bc970d5675adbf5e89292a97e6724713

    SHA256

    7755ff2707ca19344d489a5acec02d9e310425fa6e100d2f13025761676b875b

    SHA512

    fcac79d42862da6bdd3ecad9d887a975cdff2301a8322f321be58f754a26b27077b452faa4751bbd09cd3371b4afce65255fbbb443e2c93dd2cba0ba652f4a82

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\System.dll
    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\System.dll
    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\System.dll
    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\System.dll
    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • \Users\Admin\AppData\Local\Temp\nsv21F7.tmp\nsExec2.dll
    MD5

    efc6f10ce4f05bbc44d7e19a70980f95

    SHA1

    d4cf2a9b9c74f5f8d3138e1fa55edd6d54941db8

    SHA256

    99f8d8f21f463274f5df44ad5018c804ffa20e5b8ea3fae8a29162573668279e

    SHA512

    2f0ba385fad7a263c2eed677b2f835875ee1f2dc0b64e32e5a0eb657003644fc8e2f00c455a5114f8cec22e26fc51fb1598f8c743ac0a5d23ceda04524deb6cd

  • memory/1108-190-0x0000000002E46000-0x0000000002E49000-memory.dmp
    Filesize

    12KB

  • memory/1108-188-0x0000000002E40000-0x0000000002E42000-memory.dmp
    Filesize

    8KB

  • memory/1108-186-0x0000000000000000-mapping.dmp
  • memory/1292-148-0x0000000002610000-0x0000000002612000-memory.dmp
    Filesize

    8KB

  • memory/1292-153-0x0000000002616000-0x0000000002619000-memory.dmp
    Filesize

    12KB

  • memory/1292-144-0x0000000000000000-mapping.dmp
  • memory/1372-189-0x0000000000000000-mapping.dmp
  • memory/1372-192-0x0000000002C56000-0x0000000002C59000-memory.dmp
    Filesize

    12KB

  • memory/1372-191-0x0000000002C50000-0x0000000002C52000-memory.dmp
    Filesize

    8KB

  • memory/2084-183-0x0000000000000000-mapping.dmp
  • memory/2364-171-0x0000000000000000-mapping.dmp
  • memory/2792-170-0x00000000032B0000-0x00000000032B2000-memory.dmp
    Filesize

    8KB

  • memory/2792-187-0x00000000032B6000-0x00000000032B9000-memory.dmp
    Filesize

    12KB

  • memory/2792-154-0x0000000000000000-mapping.dmp
  • memory/3576-176-0x0000000000000000-mapping.dmp
  • memory/4784-194-0x0000000002C60000-0x0000000002C62000-memory.dmp
    Filesize

    8KB

  • memory/4784-196-0x0000000002C6A000-0x0000000002C6F000-memory.dmp
    Filesize

    20KB

  • memory/4784-195-0x0000000002C69000-0x0000000002C6A000-memory.dmp
    Filesize

    4KB

  • memory/4784-197-0x0000000002C66000-0x0000000002C69000-memory.dmp
    Filesize

    12KB