Malware Analysis Report

2025-03-15 06:43

Sample ID 250124-bps7dasnat
Target 32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c
SHA256 32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c
Tags
rat orcus discovery spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c

Threat Level: Known bad

The file 32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c was found to be: Known bad.

Malicious Activity Summary

rat orcus discovery spyware stealer

Orcus family

Orcus

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

Drops file in System32 directory

Enumerates physical storage devices

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-01-24 01:19

Signatures

Orcus family

orcus

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-01-24 01:19

Reported

2025-01-24 01:22

Platform

win7-20240903-en

Max time kernel

146s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcus family

orcus

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsInput.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\WindowsInput.exe C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsInput.InstallLog C:\Windows\SysWOW64\WindowsInput.exe N/A
File created C:\Windows\SysWOW64\WindowsInput.InstallState C:\Windows\SysWOW64\WindowsInput.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe

"C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe"

C:\Windows\SysWOW64\WindowsInput.exe

"C:\Windows\SysWOW64\WindowsInput.exe" --install

Network

Country Destination Domain Proto
N/A 192.168.0.40:3000 tcp
GB 94.4.114.86:3000 tcp
N/A 192.168.0.40:3000 tcp
GB 94.4.114.86:3000 tcp
N/A 192.168.0.40:3000 tcp
GB 94.4.114.86:3000 tcp
N/A 192.168.0.40:3000 tcp
GB 94.4.114.86:3000 tcp
N/A 192.168.0.40:3000 tcp
GB 94.4.114.86:3000 tcp
N/A 192.168.0.40:3000 tcp
GB 94.4.114.86:3000 tcp

Files

memory/1796-0-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

memory/1796-1-0x00000000003D0000-0x00000000004A8000-memory.dmp

memory/1796-2-0x0000000000370000-0x000000000037A000-memory.dmp

memory/1796-3-0x0000000074D60000-0x000000007544E000-memory.dmp

memory/1796-4-0x00000000020B0000-0x00000000020FC000-memory.dmp

memory/1796-5-0x00000000003C0000-0x00000000003C8000-memory.dmp

memory/1796-6-0x0000000000560000-0x000000000056C000-memory.dmp

\Windows\SysWOW64\WindowsInput.exe

MD5 e854a4636afc652b320e12e50ba4080e
SHA1 8a4ac6ecc22ee5f3a8ec846d38b41ff18c641fdc
SHA256 94b9c78c6fa2bf61fba20a08ad4563f7dd2f5668c28eff227965ce0a2032d5d5
SHA512 30aabd5079b6ed0948eb70fd18e9166096e4ba5d1d47fc35b7270f931d19bbe6cd929b6010f70297bf5272dc5a79e2523721354d211c4080d68ad8d17e316118

memory/2112-13-0x000007FEF61FE000-0x000007FEF61FF000-memory.dmp

C:\Windows\SysWOW64\WindowsInput.InstallLog

MD5 e469dda91ae810a1f94c96060f3f8a65
SHA1 0b4b3b0f6f937016b1e045ce5313ee2a65a38630
SHA256 d42fee8db8eb0e047ca53ad59b1c9bc69fe04993be36fec502e3532371908842
SHA512 2eb4037361c03e195c642a53f55a3182a6df19903db503060e366f2394750e64ae04fdaace61ef5a6dba649defc88322d78edd2928bc53ebd1ce11d68cc88dac

C:\Users\Admin\AppData\Local\Temp\InstallUtil.InstallLog

MD5 cb1bafcb3fb3195881c7c67e4261f503
SHA1 e7246d89642cd7205a745e55062123dd67a85394
SHA256 6440aac0367e1bae8944a650f73ca775ed4a0f3810576adce09d6c4f6d10f6ae
SHA512 2da4d8bf1142ccd20fa3190fd7670d67f1b48bfbbfe55a71fc8cb1570cc69f3128892bb2b02309fc0353d0b928168f3810d0b2938bd08f6b01b31910929dacf7

C:\Windows\SysWOW64\WindowsInput.InstallLog

MD5 c2291863df7c2d3038ce3c22fa276506
SHA1 7b7d2bc07a6c35523807342c747c9b6a19f3184e
SHA256 14504199bede3f46129969dbd2b7680f2e5b7fcd73a3e427ce1bb6217a6d13da
SHA512 00bf40174a67e3e663d18a887c5b461a1e5ead0b27f0a139d87969158c58f4ca72cfa5a731dda239356192ca4cb5ac6ae2b0e37401d534e686cabacd3cbee8fa

memory/2112-26-0x000007FEF5F40000-0x000007FEF68DD000-memory.dmp

memory/1796-39-0x0000000002100000-0x0000000002110000-memory.dmp

memory/1796-40-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

memory/1796-41-0x0000000074D60000-0x000000007544E000-memory.dmp

memory/2112-42-0x000007FEF5F40000-0x000007FEF68DD000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2025-01-24 01:19

Reported

2025-01-24 01:22

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcus family

orcus

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsInput.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\WindowsInput.exe C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsInput.InstallLog C:\Windows\SysWOW64\WindowsInput.exe N/A
File created C:\Windows\SysWOW64\WindowsInput.InstallState C:\Windows\SysWOW64\WindowsInput.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe

"C:\Users\Admin\AppData\Local\Temp\32bcb4be9aad2756217fed740fe4d41545cc28c46fc590a5d84943936f710a4c.exe"

C:\Windows\SysWOW64\WindowsInput.exe

"C:\Windows\SysWOW64\WindowsInput.exe" --install

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
N/A 192.168.0.40:3000 tcp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 203.109.54.23.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
GB 94.4.114.86:3000 tcp
N/A 192.168.0.40:3000 tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 65.139.73.23.in-addr.arpa udp
GB 94.4.114.86:3000 tcp
N/A 192.168.0.40:3000 tcp
US 8.8.8.8:53 180.129.81.91.in-addr.arpa udp
GB 94.4.114.86:3000 tcp
N/A 192.168.0.40:3000 tcp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
GB 94.4.114.86:3000 tcp
N/A 192.168.0.40:3000 tcp
GB 94.4.114.86:3000 tcp
N/A 192.168.0.40:3000 tcp
GB 94.4.114.86:3000 tcp
US 8.8.8.8:53 224.162.46.104.in-addr.arpa udp

Files

memory/1056-0-0x0000000074FBE000-0x0000000074FBF000-memory.dmp

memory/1056-1-0x0000000000F80000-0x0000000001058000-memory.dmp

memory/1056-2-0x00000000033D0000-0x00000000033DA000-memory.dmp

memory/1056-3-0x0000000074FB0000-0x0000000075760000-memory.dmp

memory/1056-4-0x0000000006210000-0x00000000067B4000-memory.dmp

memory/1056-5-0x0000000005F00000-0x0000000005F92000-memory.dmp

memory/1056-6-0x0000000005E60000-0x0000000005EAC000-memory.dmp

memory/1056-7-0x0000000005EB0000-0x0000000005EB8000-memory.dmp

memory/1056-8-0x0000000005FD0000-0x0000000005FF2000-memory.dmp

memory/1056-9-0x0000000005EE0000-0x0000000005EEC000-memory.dmp

C:\Windows\SysWOW64\WindowsInput.exe

MD5 e854a4636afc652b320e12e50ba4080e
SHA1 8a4ac6ecc22ee5f3a8ec846d38b41ff18c641fdc
SHA256 94b9c78c6fa2bf61fba20a08ad4563f7dd2f5668c28eff227965ce0a2032d5d5
SHA512 30aabd5079b6ed0948eb70fd18e9166096e4ba5d1d47fc35b7270f931d19bbe6cd929b6010f70297bf5272dc5a79e2523721354d211c4080d68ad8d17e316118

memory/468-21-0x00007FFC77015000-0x00007FFC77016000-memory.dmp

memory/468-22-0x000000001B400000-0x000000001B418000-memory.dmp

memory/468-23-0x000000001B440000-0x000000001B460000-memory.dmp

memory/468-24-0x00007FFC76D60000-0x00007FFC77701000-memory.dmp

memory/468-25-0x00007FFC76D60000-0x00007FFC77701000-memory.dmp

memory/468-28-0x000000001B760000-0x000000001B784000-memory.dmp

memory/468-36-0x000000001C0C0000-0x000000001C58E000-memory.dmp

memory/468-37-0x000000001C630000-0x000000001C6CC000-memory.dmp

C:\Windows\SysWOW64\WindowsInput.InstallLog

MD5 c2291863df7c2d3038ce3c22fa276506
SHA1 7b7d2bc07a6c35523807342c747c9b6a19f3184e
SHA256 14504199bede3f46129969dbd2b7680f2e5b7fcd73a3e427ce1bb6217a6d13da
SHA512 00bf40174a67e3e663d18a887c5b461a1e5ead0b27f0a139d87969158c58f4ca72cfa5a731dda239356192ca4cb5ac6ae2b0e37401d534e686cabacd3cbee8fa

memory/468-54-0x00007FFC76D60000-0x00007FFC77701000-memory.dmp

memory/1056-55-0x0000000006D90000-0x0000000006F52000-memory.dmp

memory/1056-56-0x0000000006D00000-0x0000000006D10000-memory.dmp

memory/1056-57-0x00000000070F0000-0x00000000070FA000-memory.dmp

memory/1056-58-0x0000000074FBE000-0x0000000074FBF000-memory.dmp

memory/1056-59-0x0000000074FB0000-0x0000000075760000-memory.dmp