| File name: | ShinoLocker.exe |
| Full analysis: | https://app.any.run/tasks/adb8a8c4-a83d-484a-a8a1-3e8d4a7d9f46 |
| Verdict: | Malicious activity |
| Threats: | Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying. |
| Analysis date: | August 18, 2024, 16:08:22 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | E67F48D46EF15875AABADEA8593B7D64 |
| SHA1: | 0BD90F8C891F484B535EAC7383A4587F3538916C |
| SHA256: | A640CD0D805305E4FDCC8E9C928C86D2C353C42C7BC2685183C5CCD303F7FA21 |
| SSDEEP: | 3072:M6Jx+W3yXXkg+a3g6ub5Dh5BPmZ3U8N4:aubK |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (56.7) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (21.3) |
| .scr | | | Windows screen saver (10.1) |
| .dll | | | Win32 Dynamic Link Library (generic) (5) |
| .exe | | | Win32 Executable (generic) (3.4) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:08:18 15:06:49+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 80 |
| CodeSize: | 138240 |
| InitializedDataSize: | 56320 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x23b5e |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.1 |
| ProductVersionNumber: | 1.0.0.1 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | Ransomeware Simulator |
| CompanyName: | ShinoSec Inc. |
| FileDescription: | ShinoLocker |
| FileVersion: | 1.0.0.1 |
| InternalName: | ShinoLockerMain.exe |
| LegalCopyright: | ShinoSec Inc. |
| LegalTrademarks: | ShinoLocker |
| OriginalFileName: | ShinoLockerMain.exe |
| ProductName: | ShinoLocker |
| ProductVersion: | 1.0.0.1 |
| AssemblyVersion: | 1.0.0.1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 368 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2396 --field-trial-handle=2400,i,3830077589602592969,5339677692000957792,262144 --variations-seed-version /prefetch:2 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Version: 122.0.2365.59 Modules
| |||||||||||||||
| 460 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | t6efJyuZ.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 532 | "C:\Users\admin\AppData\Local\Temp\t6efJyuZ.exe" D Wez03hsEhpTFfcIBCH1CnQ== D91JCmhNvM0wuImxRf7PuQ== "C:\Users\admin\Desktop\thosemarch.png.shino" | C:\Users\admin\AppData\Local\Temp\t6efJyuZ.exe | — | ShinoLocker.exe | |||||||||||
User: admin Company: Sh1n0g1 Integrity Level: HIGH Description: ShinoLockerStub Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 840 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=57 --mojo-platform-channel-handle=7568 --field-trial-handle=2400,i,3830077589602592969,5339677692000957792,262144 --variations-seed-version /prefetch:1 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Version: 122.0.2365.59 Modules
| |||||||||||||||
| 1356 | "C:\Users\admin\AppData\Local\Temp\t6efJyuZ.exe" D Wez03hsEhpTFfcIBCH1CnQ== D91JCmhNvM0wuImxRf7PuQ== "C:\Users\admin\Desktop\highestamount.jpg.shino" | C:\Users\admin\AppData\Local\Temp\t6efJyuZ.exe | — | ShinoLocker.exe | |||||||||||
User: admin Company: Sh1n0g1 Integrity Level: HIGH Description: ShinoLockerStub Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 1656 | "C:\Users\admin\AppData\Local\Temp\t6efJyuZ.exe" E Wez03hsEhpTFfcIBCH1CnQ== D91JCmhNvM0wuImxRf7PuQ== "C:\Users\admin\Desktop\politicspowered.jpg" | C:\Users\admin\AppData\Local\Temp\t6efJyuZ.exe | — | ShinoLocker.exe | |||||||||||
User: admin Company: Sh1n0g1 Integrity Level: HIGH Description: ShinoLockerStub Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 1928 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5756 --field-trial-handle=2400,i,3830077589602592969,5339677692000957792,262144 --variations-seed-version /prefetch:8 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 122.0.2365.59 Modules
| |||||||||||||||
| 2088 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | t6efJyuZ.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2180 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3480 --field-trial-handle=2400,i,3830077589602592969,5339677692000957792,262144 --variations-seed-version /prefetch:1 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Version: 122.0.2365.59 Modules
| |||||||||||||||
| 2228 | "C:\Users\admin\AppData\Local\Temp\t6efJyuZ.exe" D D91JCmhNvM0wuImxRf7PuQ== "C:\Users\admin\AppData\Local\Temp\6Q7KFU.txt.shino" | C:\Users\admin\AppData\Local\Temp\t6efJyuZ.exe | — | ShinoLocker.exe | |||||||||||
User: admin Company: Sh1n0g1 Integrity Level: HIGH Description: ShinoLockerStub Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| (PID) Process: | (6384) ShinoLocker.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (6384) ShinoLocker.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (6384) ShinoLocker.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (6384) ShinoLocker.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (6384) ShinoLocker.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\ShinoLocker |
| Operation: | write | Name: | P |
Value: C:\Users\admin\AppData\Local\Temp\vxXxWgXk.exe | |||
| (PID) Process: | (6384) ShinoLocker.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\ShinoLocker |
| Operation: | write | Name: | PS |
Value: C:\Users\admin\AppData\Local\Temp\t6efJyuZ.exe | |||
| (PID) Process: | (6384) ShinoLocker.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\ShinoLocker |
| Operation: | write | Name: | FL |
Value: C:\Users\admin\AppData\Local\Temp\9BGxoy.lst | |||
| (PID) Process: | (6384) ShinoLocker.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\ShinoLocker |
| Operation: | write | Name: | TF |
Value: C:\Users\admin\AppData\Local\Temp\6Q7KFU.txt | |||
| (PID) Process: | (6384) ShinoLocker.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\ShinoLocker |
| Operation: | write | Name: | TD |
Value: SPy2l50kN3 | |||
| (PID) Process: | (6384) ShinoLocker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ShinoLocker_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6384 | ShinoLocker.exe | C:\Users\admin\AppData\Local\Temp\vxXxWgXk.exe | executable | |
MD5:E67F48D46EF15875AABADEA8593B7D64 | SHA256:A640CD0D805305E4FDCC8E9C928C86D2C353C42C7BC2685183C5CCD303F7FA21 | |||
| 6384 | ShinoLocker.exe | C:\Users\admin\AppData\Local\Temp\t6efJyuZ.exe | executable | |
MD5:C139B1B02DF2BB767206A8AEF33F20DD | SHA256:6AEF2A20079A06566BB57277E587FF6DE38A92F7C7FEDA0FB341CFAF3AA13834 | |||
| 6384 | ShinoLocker.exe | C:\Users\admin\AppData\Local\Temp\6Q7KFU.txt | text | |
MD5:EC1FEDB4467E01240FEA726D4FCE445C | SHA256:5D64F9560E695785CFF9223056617139F7CC251FBF22440384B07F6BBB4CB137 | |||
| 6336 | t6efJyuZ.exe | C:\Users\admin\Desktop\highestamount.jpg.shino | binary | |
MD5:C54F7CCA1F1D30921CF9F3E4486BFDF8 | SHA256:40E7307A6CB28985DF7AB272F23C57E19FF96077774C6574083327E4FC0DD7AF | |||
| 6712 | t6efJyuZ.exe | C:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\$RBVNU1V.txt | sp | |
MD5:EC1FEDB4467E01240FEA726D4FCE445C | SHA256:5D64F9560E695785CFF9223056617139F7CC251FBF22440384B07F6BBB4CB137 | |||
| 6712 | t6efJyuZ.exe | C:\Users\admin\AppData\Local\Temp\6Q7KFU.txt.shino | binary | |
MD5:223D1FADD15CEFEB13CB431B5602AA93 | SHA256:A443D4B7F983B7BED98EC11D1CF6F395238EFA8623AAD473A554C7AE367E934E | |||
| 2584 | t6efJyuZ.exe | C:\Users\admin\Desktop\sitesdeep.jpg.shino | binary | |
MD5:0E8A39B2E2F12CD22C58288239B78EBB | SHA256:7CFBD1899138B3231F214528A90368F9C1FE47774BCA67C39E54D34CAB9B3114 | |||
| 6336 | t6efJyuZ.exe | C:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\$REG0JT0.jpg | image | |
MD5:A3CA59472C0285990EDF04870B4FE992 | SHA256:07F4589BA58528D224B97D18365FE48A7E57E552ED6B92AA87722EB7FC61D31F | |||
| 1656 | t6efJyuZ.exe | C:\Users\admin\Desktop\politicspowered.jpg.shino | binary | |
MD5:A7B0BF1FDCC85CCB9A7A640263008B9D | SHA256:BD324FBE97C52517693844775D9BAD31CF4A82CD88B9C15201E8947C01DBFF73 | |||
| 7100 | t6efJyuZ.exe | C:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\$RC5YXKV.jpg | image | |
MD5:84D9108591ABB25C7B17EFA6C8A4CA71 | SHA256:5AD0C46F08C58EDD6C06F604656610D4DFA1F4402B34B3BD5C8B60CF8DDDADBB | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6788 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
4592 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
7400 | svchost.exe | HEAD | 200 | 23.48.23.146:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/47f9eec4-45e7-4567-b813-2cac77a54a3d?P1=1724413089&P2=404&P3=2&P4=DuxEZUV%2fPQxKdU9hyaezPWdulhNRTWEEy8%2bpz3Hp%2fdEJLjylMMl8CMzWvFjUt5E7dTnufcAlwqPdFMQMxJmOlg%3d%3d | unknown | — | — | whitelisted |
6196 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
7400 | svchost.exe | GET | 206 | 23.48.23.146:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/47f9eec4-45e7-4567-b813-2cac77a54a3d?P1=1724413089&P2=404&P3=2&P4=DuxEZUV%2fPQxKdU9hyaezPWdulhNRTWEEy8%2bpz3Hp%2fdEJLjylMMl8CMzWvFjUt5E7dTnufcAlwqPdFMQMxJmOlg%3d%3d | unknown | — | — | whitelisted |
7400 | svchost.exe | GET | 206 | 23.48.23.146:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/47f9eec4-45e7-4567-b813-2cac77a54a3d?P1=1724413089&P2=404&P3=2&P4=DuxEZUV%2fPQxKdU9hyaezPWdulhNRTWEEy8%2bpz3Hp%2fdEJLjylMMl8CMzWvFjUt5E7dTnufcAlwqPdFMQMxJmOlg%3d%3d | unknown | — | — | whitelisted |
7400 | svchost.exe | GET | 206 | 23.48.23.146:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/47f9eec4-45e7-4567-b813-2cac77a54a3d?P1=1724413089&P2=404&P3=2&P4=DuxEZUV%2fPQxKdU9hyaezPWdulhNRTWEEy8%2bpz3Hp%2fdEJLjylMMl8CMzWvFjUt5E7dTnufcAlwqPdFMQMxJmOlg%3d%3d | unknown | — | — | whitelisted |
7400 | svchost.exe | GET | 206 | 23.48.23.146:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/47f9eec4-45e7-4567-b813-2cac77a54a3d?P1=1724413089&P2=404&P3=2&P4=DuxEZUV%2fPQxKdU9hyaezPWdulhNRTWEEy8%2bpz3Hp%2fdEJLjylMMl8CMzWvFjUt5E7dTnufcAlwqPdFMQMxJmOlg%3d%3d | unknown | — | — | whitelisted |
7400 | svchost.exe | GET | 206 | 23.48.23.146:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/47f9eec4-45e7-4567-b813-2cac77a54a3d?P1=1724413089&P2=404&P3=2&P4=DuxEZUV%2fPQxKdU9hyaezPWdulhNRTWEEy8%2bpz3Hp%2fdEJLjylMMl8CMzWvFjUt5E7dTnufcAlwqPdFMQMxJmOlg%3d%3d | unknown | — | — | whitelisted |
7400 | svchost.exe | GET | 206 | 23.48.23.146:80 | http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/47f9eec4-45e7-4567-b813-2cac77a54a3d?P1=1724413089&P2=404&P3=2&P4=DuxEZUV%2fPQxKdU9hyaezPWdulhNRTWEEy8%2bpz3Hp%2fdEJLjylMMl8CMzWvFjUt5E7dTnufcAlwqPdFMQMxJmOlg%3d%3d | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4088 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5632 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2120 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6384 | ShinoLocker.exe | 188.166.237.163:443 | shinolocker.com | DIGITALOCEAN-ASN | SG | unknown |
4088 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
3260 | svchost.exe | 40.113.103.199:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4592 | svchost.exe | 20.190.159.68:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
shinolocker.com |
| malicious |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
arc.msn.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5336 | SearchApp.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
6756 | msedge.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
6756 | msedge.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
6756 | msedge.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
6756 | msedge.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
Process | Message |
|---|---|
msedge.exe | [0818/161121.844:WARNING:device_ticket.cc(151)] Timed out waiting for device ticket. Canceling async operation.
|
msedge.exe | [0818/161122.681:ERROR:process_memory_win.cc(74)] ReadMemory at 0x7ff6278d0000 of 64 bytes failed: Only part of a ReadProcessMemory or WriteProcessMemory request was completed. (0x12B)
|
msedge.exe | [0818/161122.681:WARNING:pe_image_reader.cc(340)] could not read dos header from C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
msedge.exe | [0818/161122.681:ERROR:process_memory_win.cc(74)] ReadMemory at 0x7ffff85f0000 of 64 bytes failed: Only part of a ReadProcessMemory or WriteProcessMemory request was completed. (0x12B)
|
msedge.exe | [0818/161122.681:WARNING:pe_image_reader.cc(340)] could not read dos header from C:\WINDOWS\SYSTEM32\ntdll.dll
|
msedge.exe | [0818/161122.681:ERROR:process_memory_win.cc(74)] ReadMemory at 0x7ffff6f10000 of 64 bytes failed: Only part of a ReadProcessMemory or WriteProcessMemory request was completed. (0x12B)
|
msedge.exe | [0818/161122.681:WARNING:pe_image_reader.cc(340)] could not read dos header from C:\WINDOWS\System32\KERNEL32.DLL
|
msedge.exe | [0818/161122.681:ERROR:process_memory_win.cc(74)] ReadMemory at 0x7ffff5da0000 of 64 bytes failed: Only part of a ReadProcessMemory or WriteProcessMemory request was completed. (0x12B)
|
msedge.exe | [0818/161122.682:WARNING:pe_image_reader.cc(340)] could not read dos header from C:\WINDOWS\System32\KERNELBASE.dll
|
msedge.exe | [0818/161122.682:ERROR:process_memory_win.cc(74)] ReadMemory at 0x7fffd4180000 of 64 bytes failed: Only part of a ReadProcessMemory or WriteProcessMemory request was completed. (0x12B)
|