Analysis
-
max time kernel
450s -
max time network
361s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 05:10
Behavioral task
behavioral1
Sample
Magicmida.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Magicmida.exe
Resource
win10v2004-20240419-en
General
-
Target
Magicmida.exe
-
Size
4.8MB
-
MD5
cbd33d0e1cace68f044d3f1b44bbba7b
-
SHA1
8a9c635d76cd59147c294bc8ad890d317f95ebcd
-
SHA256
b724e1d087d12cf6b9ada01bfa555a3047250546f3add75b1e9086c111633b9c
-
SHA512
cf614895009d93a8c8769bfb0691c78a7b1a23ce2729d6346fa19487b4bf598bdb6f3ed7da43a571137d8d09080ffdf1cfa171080941e28b34cb2450b296f35b
-
SSDEEP
98304:YXzhW148Pd+Tf1mpcOldJQ3/Vk0dRWRbbVcNbCyfioB:sFK4s0TfLOdo/pdR6w
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
Processes:
Magicmida.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Magicmida.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ icsys.icn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Magicmida.exespoolsv.exesvchost.exeicsys.icn.exeexplorer.exespoolsv.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Magicmida.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Magicmida.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe -
Executes dropped EXE 6 IoCs
Processes:
magicmida.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 884 magicmida.exe 2548 icsys.icn.exe 2680 explorer.exe 2736 spoolsv.exe 2800 svchost.exe 2568 spoolsv.exe -
Loads dropped DLL 6 IoCs
Processes:
Magicmida.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exepid process 2240 Magicmida.exe 2240 Magicmida.exe 2548 icsys.icn.exe 2680 explorer.exe 2736 spoolsv.exe 2800 svchost.exe -
Processes:
resource yara_rule behavioral1/memory/2240-0-0x0000000000400000-0x0000000000A16000-memory.dmp themida \Windows\Resources\Themes\icsys.icn.exe themida behavioral1/memory/2548-17-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2240-16-0x0000000003380000-0x0000000003996000-memory.dmp themida \Windows\Resources\Themes\explorer.exe themida behavioral1/memory/2680-29-0x0000000000400000-0x0000000000A16000-memory.dmp themida C:\Windows\Resources\spoolsv.exe themida behavioral1/memory/2736-41-0x0000000000400000-0x0000000000A16000-memory.dmp themida \Windows\Resources\svchost.exe themida behavioral1/memory/2800-54-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2568-62-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2240-53-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2736-69-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2568-68-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2240-73-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2548-71-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2680-76-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2800-77-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2800-84-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2680-93-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2680-106-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2800-126-0x0000000000400000-0x0000000000A16000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exeMagicmida.exeicsys.icn.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magicmida.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.icn.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
Magicmida.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2240 Magicmida.exe 2548 icsys.icn.exe 2680 explorer.exe 2736 spoolsv.exe 2800 svchost.exe 2568 spoolsv.exe -
Drops file in Windows directory 6 IoCs
Processes:
Magicmida.exeicsys.icn.exeexplorer.exespoolsv.exemagicmida.exedescription ioc process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe Magicmida.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\twunk_16.exe magicmida.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1788 schtasks.exe 592 schtasks.exe 1108 schtasks.exe 2136 schtasks.exe 2792 schtasks.exe 1776 schtasks.exe 2784 schtasks.exe 1128 schtasks.exe -
Modifies registry class 64 IoCs
Processes:
magicmida.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU magicmida.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\TV_TopViewVersion = "0" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Mode = "4" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\LogicalViewMode = "1" magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Sort = 000000000000000000000000000000000200000030f125b7ef471a10a5f102608c9eebac0a0000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "4" magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = 00000000ffffffff magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg magicmida.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" magicmida.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\IconSize = "16" magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\MRUListEx = ffffffff magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5 magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0 = 52003100000000004f58b039100057696e646f7773003c0008000400efbeee3a851a4f58b0392a0000008a020000000001000000000000000000000000000000570069006e0064006f0077007300000016000000 magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell magicmida.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg magicmida.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff magicmida.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\MRUListEx = ffffffff magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0 magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\NodeSlot = "6" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\NodeSlot = "5" magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" magicmida.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" magicmida.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" magicmida.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags magicmida.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac04000000c8000000354b179bff40d211a27e00c04fc308710300000080000000354b179bff40d211a27e00c04fc308710200000080000000 magicmida.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Magicmida.exeicsys.icn.exeexplorer.exesvchost.exepid process 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2240 Magicmida.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
explorer.exesvchost.exemagicmida.exepid process 2680 explorer.exe 2800 svchost.exe 884 magicmida.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
Processes:
Magicmida.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exemagicmida.exepid process 2240 Magicmida.exe 2240 Magicmida.exe 2548 icsys.icn.exe 2548 icsys.icn.exe 2680 explorer.exe 2680 explorer.exe 2736 spoolsv.exe 2736 spoolsv.exe 2800 svchost.exe 2800 svchost.exe 2568 spoolsv.exe 2568 spoolsv.exe 884 magicmida.exe 884 magicmida.exe 884 magicmida.exe 884 magicmida.exe 884 magicmida.exe 884 magicmida.exe 884 magicmida.exe 884 magicmida.exe 884 magicmida.exe 884 magicmida.exe 884 magicmida.exe 884 magicmida.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
Magicmida.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 2240 wrote to memory of 884 2240 Magicmida.exe magicmida.exe PID 2240 wrote to memory of 884 2240 Magicmida.exe magicmida.exe PID 2240 wrote to memory of 884 2240 Magicmida.exe magicmida.exe PID 2240 wrote to memory of 884 2240 Magicmida.exe magicmida.exe PID 2240 wrote to memory of 2548 2240 Magicmida.exe icsys.icn.exe PID 2240 wrote to memory of 2548 2240 Magicmida.exe icsys.icn.exe PID 2240 wrote to memory of 2548 2240 Magicmida.exe icsys.icn.exe PID 2240 wrote to memory of 2548 2240 Magicmida.exe icsys.icn.exe PID 2548 wrote to memory of 2680 2548 icsys.icn.exe explorer.exe PID 2548 wrote to memory of 2680 2548 icsys.icn.exe explorer.exe PID 2548 wrote to memory of 2680 2548 icsys.icn.exe explorer.exe PID 2548 wrote to memory of 2680 2548 icsys.icn.exe explorer.exe PID 2680 wrote to memory of 2736 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2736 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2736 2680 explorer.exe spoolsv.exe PID 2680 wrote to memory of 2736 2680 explorer.exe spoolsv.exe PID 2736 wrote to memory of 2800 2736 spoolsv.exe svchost.exe PID 2736 wrote to memory of 2800 2736 spoolsv.exe svchost.exe PID 2736 wrote to memory of 2800 2736 spoolsv.exe svchost.exe PID 2736 wrote to memory of 2800 2736 spoolsv.exe svchost.exe PID 2800 wrote to memory of 2568 2800 svchost.exe spoolsv.exe PID 2800 wrote to memory of 2568 2800 svchost.exe spoolsv.exe PID 2800 wrote to memory of 2568 2800 svchost.exe spoolsv.exe PID 2800 wrote to memory of 2568 2800 svchost.exe spoolsv.exe PID 2680 wrote to memory of 2140 2680 explorer.exe Explorer.exe PID 2680 wrote to memory of 2140 2680 explorer.exe Explorer.exe PID 2680 wrote to memory of 2140 2680 explorer.exe Explorer.exe PID 2680 wrote to memory of 2140 2680 explorer.exe Explorer.exe PID 2800 wrote to memory of 2784 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 2784 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 2784 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 2784 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1128 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1128 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1128 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1128 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1788 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1788 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1788 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1788 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 592 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 592 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 592 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 592 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1108 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1108 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1108 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1108 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 2136 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 2136 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 2136 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 2136 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 2792 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 2792 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 2792 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 2792 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1776 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1776 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1776 2800 svchost.exe schtasks.exe PID 2800 wrote to memory of 1776 2800 svchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Magicmida.exe"C:\Users\Admin\AppData\Local\Temp\Magicmida.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\users\admin\appdata\local\temp\magicmida.exec:\users\admin\appdata\local\temp\magicmida.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:12 /f6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:13 /f6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:14 /f6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:15 /f6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:16 /f6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:17 /f6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:18 /f6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:19 /f6⤵
- Creates scheduled task(s)
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Resources\spoolsv.exeFilesize
2.6MB
MD5e6cd9dced5c6557632b78aee54bb134e
SHA1e17d1816400dc167fde9d49eddca26058a543f55
SHA256e5f97e1ce0fb47fe37010326441c0be17bbe28524119b2572c75ffe323c7a79d
SHA5121e5b06ac4a8f08af071197ebcfe690df6a1134bc5b361593c822b852e4c88dcc3b5475d9a5ead8fd64018826353f04c47fc2c61463f1d7d20f4b64d04c3ca5fc
-
\Users\Admin\AppData\Local\Temp\magicmida.exeFilesize
2.3MB
MD50da6bfd0202e990a086c05d1255b839b
SHA1d1fa6558b42cbb233439e7cd3a9f216f8e0ae6fb
SHA25653b60e285e98c837ec40abe19cb02fb647a5286623105cd5deccb5b32a604188
SHA5120c73d83ab531a47d94c44cc6d148704964fdad0587295327854148c3766246a4a1c56cda0ee33fa36b807db4cefea4534b09cd8a3aed55ce37fc10387bf521aa
-
\Windows\Resources\Themes\explorer.exeFilesize
2.6MB
MD52fbfe5883a3ed640121f5dede72e8120
SHA1b3ab4519623135b908ea1ca9b6de6aa9527b2a71
SHA2564cf8b43bb9e7e974db1ed0ead07bc04b6090aefaeed8d61a0871a1176614de54
SHA512b426231b99742b9892d721a0b6a8182528bd28a6af308eb63843eb192243f9feb9d244f9145124091d887dcf434b9f70d8a5ea5bf84621516b07634b36600b5a
-
\Windows\Resources\Themes\icsys.icn.exeFilesize
2.6MB
MD5bb720aa66d96ee76e6200aa0518b2367
SHA1fa6a7d1fe19aafe319a32ceb57db44f743e2af78
SHA2562a2cfbe23d2b7f32c43a5eee79f60915f44d1a0f833e2b2b62bd51301a52f0dc
SHA512dad6334d9f35ca4c08e268867822ed7d3b79f55b3677841aa94b6a3cbde7afa4b9af3ff30ba5ba3b796816e32fc7bf05e2eb807161b993ce47d8cc7fe221f053
-
\Windows\Resources\svchost.exeFilesize
2.6MB
MD5d8e6a4b3e21705825399eb80bd92d29e
SHA12a93a87b24e4982c6587621e47840a29b823d998
SHA256a1d0059e1a2fdf81233217ceb8ed6282c126b2ffbc38fa8f48fc8d4fe60432c6
SHA512d263ab28d4c9c6d51bcb769ee2ce4950371badb49ca81b1e8e21a8b4031421a965b83b1a6c6c63b1791dc376a3b13ea54ef7c447356f9f73b68dd4816bc72db1
-
memory/884-74-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/884-102-0x00000000012B0000-0x00000000014FD000-memory.dmpFilesize
2.3MB
-
memory/884-11-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/884-98-0x00000000012B0000-0x00000000014FD000-memory.dmpFilesize
2.3MB
-
memory/884-89-0x00000000012B0000-0x00000000014FD000-memory.dmpFilesize
2.3MB
-
memory/884-88-0x0000000004140000-0x0000000004142000-memory.dmpFilesize
8KB
-
memory/884-75-0x00000000012B0000-0x00000000014FD000-memory.dmpFilesize
2.3MB
-
memory/2240-16-0x0000000003380000-0x0000000003996000-memory.dmpFilesize
6.1MB
-
memory/2240-73-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2240-53-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2240-1-0x0000000077150000-0x0000000077152000-memory.dmpFilesize
8KB
-
memory/2240-0-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2548-17-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2548-27-0x00000000037D0000-0x0000000003DE6000-memory.dmpFilesize
6.1MB
-
memory/2548-71-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2568-62-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2568-68-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2680-78-0x0000000003750000-0x0000000003D66000-memory.dmpFilesize
6.1MB
-
memory/2680-93-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2680-76-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2680-106-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2680-29-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2680-40-0x0000000003750000-0x0000000003D66000-memory.dmpFilesize
6.1MB
-
memory/2736-52-0x0000000003830000-0x0000000003E46000-memory.dmpFilesize
6.1MB
-
memory/2736-69-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2736-41-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2800-77-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2800-54-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2800-84-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/2800-61-0x0000000003280000-0x0000000003896000-memory.dmpFilesize
6.1MB
-
memory/2800-126-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB