Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 09:22
Behavioral task
behavioral1
Sample
Batapro.exe
Resource
win10v2004-20240426-en
General
-
Target
Batapro.exe
-
Size
738KB
-
MD5
71b81937a63149221b0f1893673feb60
-
SHA1
4236ca0e2f876da5f52e266bf711bca21a83e974
-
SHA256
bf530d986a3152b576d36275fdadf0f9c439230fd0f446d1296b8380cacb9279
-
SHA512
16d221307fe845bb1da4abbcc41a688f0cd2caa75495990e3c120a9e27ab63528b0099d1fdf09fa931eb66eff675797b2caaef202dcd82fea2fed06ed3eb9284
-
SSDEEP
12288:TAPTERIP7QBU1JanUy2p3BmW1ko01b+Hkfg4z9jsTM6M+3JXMJ8ePTbn:87sU1+UyKmokL1KEfg4+w6xWJ7PTbn
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Batapro.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Batapro.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1984-1-0x0000000000100000-0x00000000001C4000-memory.dmp agile_net -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
Batapro.exepid process 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2356 1984 WerFault.exe Batapro.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Batapro.exepid process 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe 1984 Batapro.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
Processes:
msedge.exepid process 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Batapro.exedescription pid process Token: SeDebugPrivilege 1984 Batapro.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
msedge.exepid process 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe -
Suspicious use of SendNotifyMessage 26 IoCs
Processes:
msedge.exepid process 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1604 wrote to memory of 4044 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4044 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4248 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 836 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 836 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe PID 1604 wrote to memory of 4184 1604 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Batapro.exe"C:\Users\Admin\AppData\Local\Temp\Batapro.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 21202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1984 -ip 19841⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa502346f8,0x7ffa50234708,0x7ffa502347182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2028 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9028889688671977445,14326782906899447878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
912B
MD54187118b120485bdc35c7984f0879892
SHA157aed107987e0b5a3fa17889a9e624b085993d2c
SHA256582522a0be46c8f9061a49c4218db2f94a0fabfbfce5efc7e47eaa7421c06f10
SHA51206a04e1d8d652e949d67b591a7601ca0e5e4cb0e2cf9c2fd2cedbe557960798b1712aaae384d1e98f4c7818234b7848ad62df4459be999c4c93de72fe68cfe49
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5ce394b7fb4243bc1b4e7e65fca97d2d0
SHA156c11914c2861158ebd464a405c1b3f5a9258b2f
SHA2567406e7be5007124b397a7ad6eb0657269d84b61db3e7f28908f88a9c0826bf1b
SHA512e2191a56b2906264239359246d0510e9337033f61e315b183f80c7c9f8a64fbb894b1eedf46f3164cd0e783ebb2ec91a692bcd149fc80df129067a674b260452
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5377e48bfa6da482de44ccffd56c0c00c
SHA183f88f0316dbb9a8bedb61094fd23bdfdc785fde
SHA2560595953c61d412e3af4064a13c5df537a00a03d097b76b4001aecbe87703a98c
SHA5126df460dc78c231cb567ee8924565dcc43d11e575cd3a1757922a537bdf2ec98ed5858fa410cf46afeb65c39831451f5990f3981e6ed0c684e964998c29bfc4c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5ed9b5c3ce607ac21a8ccb358b0ac65e2
SHA1546bcbe00fda36531161085265d65a5d19dcbb58
SHA25658e9665e8d89c540d14c3173b1fbaba510eb30f7feb86714007dee2c678ade17
SHA512c8b710898914c67649dcf9dcbada2ac67c180049aba7425324cddaade118344b6edb658bed7cafd7d1f4370d467e196923fcb79e762ff8067c83316ea137510d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD5a4bd6bd232eebea02be151b79e698390
SHA11c32728233c36fe6a58eccdf0c50407c3cd895cb
SHA256c033aabce4bd40b28f0ea9d04b25ed2bfedbe44ce7867cb7e4fef843019ddfe6
SHA5122b272015a10b2ba696237b83b1c33a02702b56560f74d623a660940c462678e5e54755054cbee72ba95cb6e50e5e6b06161afb45aad61f924c4ddb6f7a9792c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
96B
MD520bcd2338fab8df6ec227eb4c264316d
SHA161ed2077cabe37c6cc42d85a9199bde28c7bf7e6
SHA25635f02373c7f2b74765c49ec28c484cddcbb2f9efd8fb7b36e8e9c49b1429fa62
SHA512753d09c67749d3aafe8c204319b801a6af51c443cc9df5bf1d5e82b92caab03285e47045a7d15755e63317ef2cafb131610c06a7c8b0de54f78c6a7562bfb721
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5832d3.TMPFilesize
48B
MD5acb709c4cb39d39ae521125e0ad57606
SHA15daaa7f0e378153c1897d427e1c3734d145a0f19
SHA2564e44788939e403c4c71bf026eea1fefdc6b8b0a458d954d14989d5292c851014
SHA512c21fc880e4f672d06fe008bc8070ee02f3c7fe5638bbbfac5f2e448c32d45625161e639b977de9d9758caf5940fa62a6e06717c1edc97d15fcd0cce7910d3f1e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe580460.TMPFilesize
370B
MD5d9bf8aaa6ffeb462791dcb768b705ab1
SHA1be23499ded413c9bddbc3e5ce77e5338e567112a
SHA256cfcbb94106d9a35ebe5ecf7ca6f96a87b91ab8ce808ae55f3d9609c7f6ce3265
SHA512c4f89d1a4c436484e5cb2319ec73efe26d7758c7f2ec4f18ad59d83704b85aceb7c16e01f7de8eddfce38a2ae1908e3207e7b9cafd94cd4fd1923f6c90b91405
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e9e0a5b9-c65c-42c8-b365-029df88dbc38.tmpFilesize
1KB
MD5089fde2b0a9c8eb23335b443aa22817c
SHA1bce7d5e8cdd70996fa710e393ec4266685ba85a4
SHA256ed4d2217e166386f9544ce51ccae946e70d9f6ff2501a67824a173be61ac6c4a
SHA512a00f1ea6e36f9158a6c25534721f207b5501a8425d38f6b3eea25a3e6bb510b3c816fddd7af6ed14cb47c48341c65d401c6d8a6cf58d30f5ba01fd814badf390
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
10KB
MD5412b5622f8bfe8df6c818a82482578f2
SHA185b982046447ac4fd9cc87f70083ec68ba339566
SHA256345c1a849aa0809947f23309ed031f224e26b26fabe25692ec345aa2a4b85467
SHA512dbc726b3fef5eed6962c131448104f460921dbb7f1421cf5a780201b63ddc97d8d7aef9393820c0581e504ddf3f8df099b1fab22c7b2b2841be595689512e029
-
C:\Users\Admin\AppData\Local\TempBatapro-QDKVG.exeFilesize
17KB
MD5dfd3df2f877d2d406d9151cf77a3c358
SHA1b46757e1eee470dbf0b1fd5e9e72183edad90ad9
SHA256f284712c9b095a987c6400062a9a7bc58ee8ac6349944337bf8230f28c2d2792
SHA51299a76c018a4c120e4e6825e4b7d9f76d5b337ce5e7328a4ebd1c92db749d8a50f35586df3713a149afc6b34bffff8a0f7f0ca04acb4ff47261eec5d280f9810f
-
\??\pipe\LOCAL\crashpad_1604_YABIBVQKXPSSUHCWMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1984-9-0x00000000063B0000-0x00000000063EC000-memory.dmpFilesize
240KB
-
memory/1984-2-0x0000000004A10000-0x0000000004A9A000-memory.dmpFilesize
552KB
-
memory/1984-3-0x0000000074B70000-0x0000000075320000-memory.dmpFilesize
7.7MB
-
memory/1984-0-0x0000000074B7E000-0x0000000074B7F000-memory.dmpFilesize
4KB
-
memory/1984-19-0x0000000074B70000-0x0000000075320000-memory.dmpFilesize
7.7MB
-
memory/1984-4-0x0000000004C00000-0x0000000004C12000-memory.dmpFilesize
72KB
-
memory/1984-8-0x0000000005BD0000-0x0000000005BF2000-memory.dmpFilesize
136KB
-
memory/1984-1-0x0000000000100000-0x00000000001C4000-memory.dmpFilesize
784KB
-
memory/1984-7-0x0000000074B70000-0x0000000075320000-memory.dmpFilesize
7.7MB
-
memory/1984-6-0x0000000004CD0000-0x0000000004D36000-memory.dmpFilesize
408KB
-
memory/1984-5-0x00000000051D0000-0x0000000005774000-memory.dmpFilesize
5.6MB