Overview
overview
10Static
static
319408d20ed...1b.exe
windows7-x64
319408d20ed...1b.exe
windows10-2004-x64
10209f361ec5...19.exe
windows7-x64
3209f361ec5...19.exe
windows10-2004-x64
102260e01650...fc.exe
windows10-2004-x64
1024b96bca46...df.exe
windows10-2004-x64
102a4e0bfefe...ad.exe
windows10-2004-x64
1030b28fbbc6...6a.exe
windows10-2004-x64
1045405e3261...66.exe
windows10-2004-x64
1055ab9707d2...50.exe
windows10-2004-x64
106568836094...3d.exe
windows10-2004-x64
1072a27ce3ad...a5.exe
windows10-2004-x64
109be0387d86...b9.exe
windows10-2004-x64
109d44150fdc...7d.exe
windows10-2004-x64
6b2402bf5ca...fa.exe
windows10-2004-x64
10c6bd926d58...44.exe
windows10-2004-x64
10cd321830f5...bc.exe
windows10-2004-x64
10cfcca94dd6...6e.exe
windows10-2004-x64
10dfa156ac28...ff.exe
windows10-2004-x64
10f1ae7fab47...cc.exe
windows10-2004-x64
10f25337a343...56.exe
windows10-2004-x64
10f5d16598bf...16.exe
windows7-x64
10f5d16598bf...16.exe
windows10-2004-x64
10Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 17:57
Static task
static1
Behavioral task
behavioral1
Sample
19408d20edf49736ff3e86b9c52dcd2bf4b3da61eff72888392b2de04e27351b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
19408d20edf49736ff3e86b9c52dcd2bf4b3da61eff72888392b2de04e27351b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
209f361ec54d3eb7e8c1324ecea4c86835a53f08014f20d8acdb405a98c70e19.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
209f361ec54d3eb7e8c1324ecea4c86835a53f08014f20d8acdb405a98c70e19.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2260e01650710f720d71241eb7bd5d4c48d8b8a009804752139cf762bcd962fc.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
24b96bca469764debd638550bc2704add4701110cc7a691fae627e361d8188df.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2a4e0bfefe7b6b2a94d46c408fe05d1682392c66666138b8b0c32e028bf15aad.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
30b28fbbc6f9f8aa27776aa07f15f77a8fe9829ca5ded9e75d26ca377674a46a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
45405e326148ce7f80326893b92fe8efe62819ee5465fdc13767a76472e21566.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
55ab9707d2ed04fd65eb47b64da270cf7fa47cedb721831c5dd0567bda7cc950.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
6568836094de3a32f9c325ced189bb981eb0cf8f4492e1b8b901ef52879c063d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
72a27ce3ad4f2daa863374d24914b9bdd41f5b34e08b440b9988fd847de7a3a5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
9be0387d865bef272b66fe34363fa38f5c4e2be5b6b773526bfc1d14b4791eb9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
b2402bf5ca4c67871f6519e689231078532c147c35500668d062dec52e27e9fa.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c6bd926d58aa119662ccfb970124884439404950b8aa818378fa47a61a658a44.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
cd321830f55d58d1391cb6f68bd887e31a7e1c0da19880caac02e0804afeb9bc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
cfcca94dd6bef9e4222fd6347d090711d60251b7718a2a4955753cd95d8e9a6e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
dfa156ac28a140cde5b62ac7d594d1000da526091fd584c8e8caa96c692a5bff.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f1ae7fab47b54b57b64fe4b0569d28421b914cc77c243cf2d59a0645d15e8ecc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
f25337a343c26cdecd99eb7f095938fd24fb233463a8af3fa69acc5201eed956.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
f5d16598bff76b7aeece243b4478a48e666bbf1a2adb20f2684cefe2f7d06616.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
f5d16598bff76b7aeece243b4478a48e666bbf1a2adb20f2684cefe2f7d06616.exe
Resource
win10v2004-20240508-en
General
-
Target
9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe
-
Size
175KB
-
MD5
b0762cb364c4a6dcaf988e98769222a2
-
SHA1
383306a9f9e8adc5f893ff3913131e6610525c95
-
SHA256
9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d
-
SHA512
6e2ca96e53ffd5d89d7b800f21c7636b87935fcd8261aac4a936c96a0a3e103ee9704f7cec541c0babfc6ba66e7882d44ac4f7037219ac07c6e6e6273d3056ef
-
SSDEEP
3072:KNy+bnr+O1R5GWp1icKAArDZz4N9GhbkrNEk1pRroMK6y6S+:KNy+bnr+2p0yN90QE6KMlz
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 AutoGetFTA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3320 msedge.exe 3320 msedge.exe 3744 identity_helper.exe 3744 identity_helper.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2696 1456 9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe 85 PID 1456 wrote to memory of 2696 1456 9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe 85 PID 1456 wrote to memory of 2696 1456 9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe 85 PID 2696 wrote to memory of 3320 2696 AutoGetFTA.exe 94 PID 2696 wrote to memory of 3320 2696 AutoGetFTA.exe 94 PID 3320 wrote to memory of 4560 3320 msedge.exe 95 PID 3320 wrote to memory of 4560 3320 msedge.exe 95 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 2444 3320 msedge.exe 97 PID 3320 wrote to memory of 3256 3320 msedge.exe 98 PID 3320 wrote to memory of 3256 3320 msedge.exe 98 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99 PID 3320 wrote to memory of 3160 3320 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe"C:\Users\Admin\AppData\Local\Temp\9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AutoGetFTA.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AutoGetFTA.exe -snpk:"4983000338,TXBQ9-J7PF2" -install:1 -requestID:"951147" -silent2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://activate.rockwellautomation.com/3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x104,0x170,0x7ffd5d1746f8,0x7ffd5d174708,0x7ffd5d1747184⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,7598686395298132979,18143573803869290444,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:24⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,7598686395298132979,18143573803869290444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,7598686395298132979,18143573803869290444,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:84⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7598686395298132979,18143573803869290444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:14⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7598686395298132979,18143573803869290444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:14⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,7598686395298132979,18143573803869290444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:84⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,7598686395298132979,18143573803869290444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7598686395298132979,18143573803869290444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:14⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7598686395298132979,18143573803869290444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:14⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7598686395298132979,18143573803869290444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:14⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7598686395298132979,18143573803869290444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:14⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,7598686395298132979,18143573803869290444,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3132 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5f133809c5672435f9e0b9742f669a675
SHA1e12e86b40c9d5bf5eac15e5803c2e5408f00548d
SHA25636128e4bb6dd9beb22bd34e17a0baaa3df24b127fd0b0dd074255cef3d1625ff
SHA512bd3ab5501ac0209d8ef2c6a69a6f6672ca048edb2591ae9fa2ecfc75a6841a20736f8ef6d056970187294628613a9a806edca5ef8945f3cbee996d29cfed76c6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.rockwellautomation.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD50a1547e999541a9d33bc0f7fa7648dc8
SHA103b7c3d91e3d79245bd33e19ff7e605f745187ed
SHA25698e2998d774a125500616bd3f9ac7d4ece83586373d660c7a997aba6feba0775
SHA512a1055e38ae9ba93680c3cefa88be06fe79c96128d9a76a5428782a81c50453285f5b9d3aea8c2984fa528eeaf48438a37838a5dc31d30a69289737d86d5c314d
-
Filesize
6KB
MD59d80742099b9ed9b2b73beace243b91a
SHA149d5f67406472ab5202302f9dfd8a97c09fee462
SHA256ecf2a8262313fc4c8870334f2f02257f2117f9a0f6511188596d8d14ebba19e7
SHA512d812b1053071e55eeca848c207bcfbd4ef4cbbcb436d818c1cc8f72e7f5b6230485ce047a89ef443459b2247fe5b98d2f251d45111c2a536bcdb423f2b18120a
-
Filesize
6KB
MD57da6c0a5bf523e7715943b66372ca288
SHA10441716e3742e3559e89c9501c2351f14baf5bdf
SHA256f627c05370ed0930a77f5d1bd37d7e48a75dddd5732641310b18fa344ee2a1de
SHA512f1e489f01b0de3fdab780a2f8509f81612ad52e95114a1114cb45962a3ea31ac4906dd9fba0f97cdc558c5c9022e3c076c59869d8b7c717e651fd5613e6d9b33
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5c102c0430d1e6f6f594cf2972d7bcc71
SHA1ae24ba34ab318cd181b5c8737c9b9b7b0161fb56
SHA256f2c34ead1409409445cdf027506455d594eb5f0c25d749ded1fc2090fce327a2
SHA512c45276023ffbbc3b55fa8652c7fbc460d56ae679ec3b450b58d40d7e1189d8cf4faa0c0ca03865f5c888b75f72d7136a8ccd83d52eb30ad45970ed351fee5ab5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57e7b0.TMP
Filesize48B
MD5a07e0853b1a3b71e52515c7f5cb6066e
SHA1aac541c8a2b3d3362deac86b6213b34cedd5c159
SHA256f7983ef45a1c8eec91e965bb1f9dc08b34e56bf3c7f8bcc2068cfc926965eb75
SHA512311b0bac3a5965df81948d21b3cbfb736a391799f54ad3bedae716532736c5bc006ba2a51f307234a35f329ab5563dcb225e6cab95ad1c71af0a3e9cc4795691
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5503ebc9114100601dbb340a39dca0530
SHA1090ede4a1522e4aac9165266596839ffd57eefd1
SHA256e28b9e28f59d2a0cb8fdbd5d82c8f5ad613cc733cc2bf8cb5b46a5cdcd309b8a
SHA51217a321da92abc0bcdda86fa4c39a324020f806c031a7ee8b2c9ed3f78bf1e7368336ed84521609bb987c73fd504a5e6fbae26cdf6d9cf50d2eff5f901bded583
-
Filesize
19KB
MD5b5e74e72395095e7804555f8f53cb96b
SHA12282e82dfb283581704dbaf36c71a979eb7520ba
SHA2566a3dc087a1de33c527eb6e307ec2853ec14456f1d62ada55a36974fb2a3fc158
SHA5120ee5e9d7c70bc71f3e0d5bab01223a49bc96bda63aee479f06acb9864855b04a1a6aa668e5966a58e56cfcd7d83651b89d501c2c583b58094fb60479e0de1c86