Analysis Overview
SHA256
d0b0b202a25d0149c47a7d1a266234eefb2eac042d76fc36695b01b48cb610ad
Threat Level: Known bad
The file 561e639b3bc1c5a944851c93ce58fbf8 was found to be: Known bad.
Malicious Activity Summary
Orcus
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Orcurs Rat Executable
Checks computer location settings
Executes dropped EXE
Identifies Wine through registry keys
Checks BIOS information in registry
Loads dropped DLL
Suspicious use of NtSetInformationThreadHideFromDebugger
Drops file in System32 directory
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-12-26 04:58
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-12-26 04:58
Reported
2024-01-05 22:33
Platform
win7-20231129-en
Max time kernel
3s
Max time network
149s
Command Line
Signatures
Orcus
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
Orcurs Rat Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsInput.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsInput.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\WindowsInput.exe | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
| File created | C:\Windows\SysWOW64\WindowsInput.exe.config | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
| File created | C:\Windows\SysWOW64\WindowsInput.InstallState | C:\Windows\SysWOW64\WindowsInput.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 824 wrote to memory of 3040 | N/A | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | C:\Windows\SysWOW64\WindowsInput.exe |
| PID 824 wrote to memory of 3040 | N/A | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | C:\Windows\SysWOW64\WindowsInput.exe |
| PID 824 wrote to memory of 3040 | N/A | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | C:\Windows\SysWOW64\WindowsInput.exe |
| PID 824 wrote to memory of 3040 | N/A | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | C:\Windows\SysWOW64\WindowsInput.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe
"C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe"
C:\Windows\SysWOW64\WindowsInput.exe
"C:\Windows\SysWOW64\WindowsInput.exe"
C:\Program Files (x86)\Broker\Broker.exe
"C:\Program Files (x86)\Broker\Broker.exe"
C:\Windows\SysWOW64\WindowsInput.exe
"C:\Windows\SysWOW64\WindowsInput.exe" --install
C:\Program Files (x86)\Broker\Broker.exe
"C:\Program Files (x86)\Broker\Broker.exe"
C:\Windows\system32\taskeng.exe
taskeng.exe {D1F01780-7A09-474A-8498-CF5451E86B55} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
Network
| Country | Destination | Domain | Proto |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp |
Files
memory/824-0-0x0000000000010000-0x0000000000746000-memory.dmp
memory/824-1-0x0000000077E60000-0x0000000077E62000-memory.dmp
memory/824-3-0x0000000075730000-0x0000000075739000-memory.dmp
memory/824-2-0x00000000755E0000-0x000000007562A000-memory.dmp
memory/824-5-0x0000000074E70000-0x000000007555E000-memory.dmp
memory/824-10-0x0000000004F90000-0x0000000004FD0000-memory.dmp
memory/824-11-0x0000000002730000-0x000000000273E000-memory.dmp
memory/824-12-0x0000000002970000-0x00000000029CC000-memory.dmp
memory/824-9-0x0000000074CF0000-0x0000000074D70000-memory.dmp
memory/824-14-0x0000000074A10000-0x0000000074A27000-memory.dmp
memory/824-13-0x0000000074A30000-0x0000000074A3B000-memory.dmp
memory/824-16-0x00000000029E0000-0x00000000029F2000-memory.dmp
memory/824-26-0x0000000077820000-0x00000000779BD000-memory.dmp
memory/3040-29-0x0000000000B40000-0x0000000000B4C000-memory.dmp
memory/824-27-0x0000000076FA0000-0x0000000077023000-memory.dmp
memory/824-25-0x0000000077030000-0x00000000770D0000-memory.dmp
memory/824-31-0x00000000755E0000-0x000000007562A000-memory.dmp
memory/3040-32-0x000000001AFB0000-0x000000001B030000-memory.dmp
memory/3040-30-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp
memory/2460-37-0x00000000002C0000-0x00000000002CC000-memory.dmp
memory/824-38-0x0000000074E70000-0x000000007555E000-memory.dmp
memory/2460-39-0x000007FEF5640000-0x000007FEF602C000-memory.dmp
memory/3040-35-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp
memory/824-48-0x0000000070060000-0x000000007046B000-memory.dmp
memory/824-49-0x0000000006430000-0x0000000006B66000-memory.dmp
memory/824-57-0x0000000077540000-0x000000007760C000-memory.dmp
memory/824-61-0x0000000074900000-0x000000007490E000-memory.dmp
memory/824-62-0x0000000077030000-0x00000000770D0000-memory.dmp
memory/824-64-0x0000000077820000-0x00000000779BD000-memory.dmp
memory/824-65-0x0000000070060000-0x000000007046B000-memory.dmp
memory/824-63-0x0000000000010000-0x0000000000746000-memory.dmp
memory/824-60-0x0000000074A10000-0x0000000074A27000-memory.dmp
memory/824-59-0x0000000074A30000-0x0000000074A3B000-memory.dmp
memory/824-58-0x0000000074E70000-0x000000007555E000-memory.dmp
memory/824-56-0x0000000075B70000-0x0000000075C60000-memory.dmp
memory/824-55-0x0000000074CF0000-0x0000000074D70000-memory.dmp
memory/824-54-0x0000000075730000-0x0000000075739000-memory.dmp
memory/824-53-0x00000000755E0000-0x000000007562A000-memory.dmp
memory/824-52-0x0000000076FA0000-0x0000000077023000-memory.dmp
memory/2620-51-0x00000000001C0000-0x00000000008F6000-memory.dmp
memory/824-17-0x0000000004B00000-0x0000000004B08000-memory.dmp
memory/824-15-0x0000000074900000-0x000000007490E000-memory.dmp
memory/824-8-0x0000000077540000-0x000000007760C000-memory.dmp
memory/824-7-0x0000000000010000-0x0000000000746000-memory.dmp
memory/824-6-0x0000000075B70000-0x0000000075C60000-memory.dmp
memory/824-4-0x0000000000010000-0x0000000000746000-memory.dmp
memory/2620-70-0x0000000074CA0000-0x0000000074D20000-memory.dmp
memory/2620-71-0x00000000001C0000-0x00000000008F6000-memory.dmp
memory/2620-74-0x0000000077540000-0x000000007760C000-memory.dmp
memory/2620-76-0x0000000074BF0000-0x0000000074C07000-memory.dmp
memory/2620-81-0x0000000074880000-0x00000000748FD000-memory.dmp
memory/2620-82-0x0000000074820000-0x000000007487F000-memory.dmp
memory/2620-80-0x0000000076FA0000-0x0000000077023000-memory.dmp
memory/2620-83-0x0000000004E70000-0x0000000004E88000-memory.dmp
memory/2620-85-0x0000000077030000-0x00000000770D0000-memory.dmp
memory/2460-84-0x000007FEF5640000-0x000007FEF602C000-memory.dmp
memory/2620-79-0x0000000074BE0000-0x0000000074BEE000-memory.dmp
memory/2620-78-0x0000000004E90000-0x0000000004ED0000-memory.dmp
memory/2620-77-0x0000000000D50000-0x0000000000D9E000-memory.dmp
memory/2620-75-0x0000000074C10000-0x0000000074C1B000-memory.dmp
memory/2620-73-0x00000000001C0000-0x00000000008F6000-memory.dmp
memory/2620-72-0x0000000074E20000-0x000000007550E000-memory.dmp
memory/2620-69-0x0000000075620000-0x0000000075629000-memory.dmp
memory/2620-68-0x0000000075590000-0x00000000755DA000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-12-26 04:58
Reported
2024-01-05 22:33
Platform
win10v2004-20231215-en
Max time kernel
38s
Max time network
172s
Command Line
Signatures
Orcus
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
Orcurs Rat Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsInput.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\WindowsInput.exe | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
| File created | C:\Windows\SysWOW64\WindowsInput.exe.config | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 5012 wrote to memory of 4788 | N/A | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | C:\Windows\SysWOW64\WindowsInput.exe |
| PID 5012 wrote to memory of 4788 | N/A | C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe | C:\Windows\SysWOW64\WindowsInput.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe
"C:\Users\Admin\AppData\Local\Temp\561e639b3bc1c5a944851c93ce58fbf8.exe"
C:\Windows\SysWOW64\WindowsInput.exe
"C:\Windows\SysWOW64\WindowsInput.exe" --install
C:\Windows\SysWOW64\WindowsInput.exe
"C:\Windows\SysWOW64\WindowsInput.exe"
C:\Program Files (x86)\Broker\Broker.exe
"C:\Program Files (x86)\Broker\Broker.exe"
C:\Program Files (x86)\Broker\Broker.exe
"C:\Program Files (x86)\Broker\Broker.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 20.177.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 210.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 74.208.235.52:27016 | tcp | |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 158.240.127.40.in-addr.arpa | udp |
| US | 74.208.235.52:27016 | tcp | |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.134.221.88.in-addr.arpa | udp |
| US | 74.208.235.52:27016 | tcp | |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp | |
| US | 74.208.235.52:27016 | tcp |
Files
memory/5012-0-0x0000000000900000-0x0000000001036000-memory.dmp
memory/5012-1-0x00000000772E4000-0x00000000772E6000-memory.dmp
memory/5012-3-0x0000000000900000-0x0000000001036000-memory.dmp
memory/5012-2-0x0000000074200000-0x00000000749B0000-memory.dmp
memory/5012-4-0x0000000000900000-0x0000000001036000-memory.dmp
memory/5012-5-0x00000000055E0000-0x00000000055F0000-memory.dmp
memory/5012-6-0x00000000053C0000-0x00000000053CE000-memory.dmp
memory/5012-7-0x0000000005490000-0x00000000054EC000-memory.dmp
memory/5012-8-0x0000000005BA0000-0x0000000006144000-memory.dmp
memory/5012-9-0x00000000055F0000-0x0000000005682000-memory.dmp
memory/5012-12-0x0000000005B40000-0x0000000005B62000-memory.dmp
memory/5012-11-0x0000000005AF0000-0x0000000005AF8000-memory.dmp
memory/5012-10-0x0000000005AE0000-0x0000000005AF2000-memory.dmp
C:\Windows\SysWOW64\WindowsInput.exe
| MD5 | e6fcf516d8ed8d0d4427f86e08d0d435 |
| SHA1 | c7691731583ab7890086635cb7f3e4c22ca5e409 |
| SHA256 | 8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337 |
| SHA512 | c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e |
C:\Windows\SysWOW64\WindowsInput.exe.config
| MD5 | a2b76cea3a59fa9af5ea21ff68139c98 |
| SHA1 | 35d76475e6a54c168f536e30206578babff58274 |
| SHA256 | f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839 |
| SHA512 | b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad |
memory/4788-26-0x00000000008F0000-0x00000000008FC000-memory.dmp
memory/4788-27-0x00007FFC49140000-0x00007FFC49C01000-memory.dmp
memory/4788-28-0x000000001B690000-0x000000001B6A0000-memory.dmp
memory/4788-30-0x0000000001260000-0x000000000129C000-memory.dmp
memory/4788-29-0x00000000010C0000-0x00000000010D2000-memory.dmp
memory/4788-34-0x00007FFC49140000-0x00007FFC49C01000-memory.dmp
memory/5012-36-0x0000000000900000-0x0000000001036000-memory.dmp
memory/4372-38-0x0000000019E80000-0x0000000019E90000-memory.dmp
memory/4372-37-0x00007FFC49140000-0x00007FFC49C01000-memory.dmp
memory/4372-39-0x000000001A3A0000-0x000000001A4AA000-memory.dmp
C:\Program Files (x86)\Broker\Broker.exe
| MD5 | f468b6a6dea51da0b6d3185f21609117 |
| SHA1 | 4cc32c04c4d7b4874bb0b6f2f87b3e66fc903160 |
| SHA256 | 1d674c903a6f6d2d7b11d444fb154b197ec3301385d3180de95a7d00c13bd3e7 |
| SHA512 | 08cda1dd3afa5c8d03b782f28345b40d09c8b0ff6645717114ad23bc2fe48d92d9582e287e8784709e14c7e42b9a5641b1df60c2dfd5867335d7c793d8727b90 |
C:\Program Files (x86)\Broker\Broker.exe
| MD5 | 52f200b5bac1ff2ce8849ba463af581a |
| SHA1 | c8a5fcd34607a490fd01446e04f2479058101181 |
| SHA256 | 183f7e31c05ae2f41636c0697f69b619edeb5f86bf585f933409fc669ade2e70 |
| SHA512 | aa2f3bb9302ba68f1a427d777ea24f495d732bd62fc32d75c8f81fa24e105a1e4a5589f695d704ea39cb571c7e56ab3ef1daa777a80d19487d79faea7622f933 |
memory/396-53-0x0000000000110000-0x0000000000846000-memory.dmp
memory/5012-55-0x0000000000900000-0x0000000001036000-memory.dmp
memory/5012-56-0x0000000074200000-0x00000000749B0000-memory.dmp
C:\Program Files (x86)\Broker\Broker.exe
| MD5 | 3b0b723d98d35fb6a38f2c2bce8fd655 |
| SHA1 | 7549fa9ad150b02e7fa5ef889c0f532c0400a8dc |
| SHA256 | 733fba55616523dc133efb89bfb5844c8b5326f035af67327889a0d2fd1fb6ad |
| SHA512 | 2ded7b4a0573c1e6ab6f1b9ff699a1ce283220fb3e4ac542db9367d275212e1d0f14564f4c5f1bb7e8e08d2bc3280fac4a4859f4e3c02c0b88d5c3f9c70695b9 |
memory/396-59-0x0000000074200000-0x00000000749B0000-memory.dmp
memory/396-60-0x0000000000110000-0x0000000000846000-memory.dmp
memory/396-61-0x0000000000110000-0x0000000000846000-memory.dmp
memory/396-62-0x0000000005470000-0x0000000005480000-memory.dmp
memory/396-63-0x0000000005930000-0x000000000597E000-memory.dmp
C:\Program Files (x86)\Broker\Broker.exe
| MD5 | ab62b773a2cf4c3dbca74a7248a9ac47 |
| SHA1 | 912f89afd46deaad37dfeb87d2be7a66f677eb89 |
| SHA256 | e63bb6d9fd15d39d09d39408f831535d55f8482f9426e83bef287ce6e037b6f7 |
| SHA512 | cac342ba666ae658d557450e5161a5868badd5f7536cc13cc2a568c593cb3e3c272041975ee98f161832ca93ed19d530647b6e1461945da052deba9a67e1e524 |
memory/1404-66-0x0000000000110000-0x0000000000846000-memory.dmp
memory/396-65-0x00000000059F0000-0x0000000005A08000-memory.dmp
memory/396-67-0x00000000062B0000-0x00000000062C0000-memory.dmp
memory/396-68-0x00000000064A0000-0x00000000064AA000-memory.dmp
memory/4372-70-0x00007FFC49140000-0x00007FFC49C01000-memory.dmp
memory/1404-72-0x0000000000110000-0x0000000000846000-memory.dmp
memory/1404-73-0x0000000000110000-0x0000000000846000-memory.dmp
memory/1404-71-0x0000000074200000-0x00000000749B0000-memory.dmp
memory/4372-74-0x0000000019E80000-0x0000000019E90000-memory.dmp
memory/396-75-0x0000000000110000-0x0000000000846000-memory.dmp
memory/1404-79-0x0000000000110000-0x0000000000846000-memory.dmp
memory/1404-80-0x0000000074200000-0x00000000749B0000-memory.dmp
memory/396-82-0x0000000074200000-0x00000000749B0000-memory.dmp
memory/396-83-0x0000000005470000-0x0000000005480000-memory.dmp