Analysis

  • max time kernel
    91s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 00:25

General

  • Target

    https://tinyurl.com/synapse-x-remake

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 46 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://tinyurl.com/synapse-x-remake
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda94d46f8,0x7ffda94d4708,0x7ffda94d4718
      2⤵
        PID:1784
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:2
        2⤵
          PID:5048
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1508
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:8
          2⤵
            PID:2916
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
            2⤵
              PID:3608
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
              2⤵
                PID:1308
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:8
                2⤵
                  PID:3492
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4912
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:1
                  2⤵
                    PID:3244
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:1
                    2⤵
                      PID:3920
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:1
                      2⤵
                        PID:1416
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1
                        2⤵
                          PID:3392
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5544 /prefetch:8
                          2⤵
                            PID:4616
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:1
                            2⤵
                              PID:2296
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,10180583393319467138,4690477065823219419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4564
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1852
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4796
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:2016
                                • C:\Users\Admin\Downloads\SynXRemakeV1.0.6\SynXRemakeV1.0.6\SynapseRemake.exe
                                  "C:\Users\Admin\Downloads\SynXRemakeV1.0.6\SynXRemakeV1.0.6\SynapseRemake.exe"
                                  1⤵
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3744
                                  • C:\Users\Admin\Downloads\SynXRemakeV1.0.6\SynXRemakeV1.0.6\SynapseRemake.exe
                                    "C:\Users\Admin\Downloads\SynXRemakeV1.0.6\SynXRemakeV1.0.6\SynapseRemake.exe"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SetWindowsHookEx
                                    PID:3564
                                • C:\Users\Admin\Downloads\SynXRemakeV1.0.6\SynXRemakeV1.0.6\inject.exe
                                  "C:\Users\Admin\Downloads\SynXRemakeV1.0.6\SynXRemakeV1.0.6\inject.exe"
                                  1⤵
                                    PID:1880
                                    • C:\Users\Admin\AppData\Local\Temp\onefile_1880_133721296395540730\main.exe
                                      C:\Users\Admin\Downloads\SynXRemakeV1.0.6\SynXRemakeV1.0.6\inject.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:824

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    53bc70ecb115bdbabe67620c416fe9b3

                                    SHA1

                                    af66ec51a13a59639eaf54d62ff3b4f092bb2fc1

                                    SHA256

                                    b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771

                                    SHA512

                                    cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    e765f3d75e6b0e4a7119c8b14d47d8da

                                    SHA1

                                    cc9f7c7826c2e1a129e7d98884926076c3714fc0

                                    SHA256

                                    986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89

                                    SHA512

                                    a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    334B

                                    MD5

                                    3ae8d9b64d413a3847ad0a4f826d24c4

                                    SHA1

                                    01c444026f011c30f44a216f81df52962a560e74

                                    SHA256

                                    03089485c28dd7d97943647f816e34530fb1f34221db352d92c19c2a817b21e8

                                    SHA512

                                    302ecc17ced2282b78508520ef3344991c2cffcc4988c236f5839228f51d35c2d77146217d4cf95aba773a90e62928f26b4959d9d45ab4b2822c3691162396d0

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    1bce218b855e23aa3093b8ffebbea7bc

                                    SHA1

                                    520553098254881019ab492e0ef434e28f3355d7

                                    SHA256

                                    48848389827f2ffa814d9e400e1d6102f2946088d043bb8b18d966152af83815

                                    SHA512

                                    9ad2cf99d19aeb73b0903d3c0fd68c0fe80aae74f65c9569ebab4fa72e7906baa2364a219042c10b374b922b7387c482866ea219503990951a43ca0b90eac182

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    05a4657c2a0c4085cea8f2fcb9569158

                                    SHA1

                                    373e115482c83ac2d0f991161ae7f65c32f0c8d6

                                    SHA256

                                    756039be6a8c6ebcfa46ca2b2bcfc65370346dc6951dfcc6dc003142ee2650bb

                                    SHA512

                                    207fadb18629ef2a5defd91a3dca9756ba86d8de7409b796ec99b91a49ecb456e1deda6a0b2b278e72c0460468b6cb2efdef490c5802b499c404387d5fe325ed

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    c55503931beb0a1a156e1cd62c281231

                                    SHA1

                                    3ad6d80ed70b4348842184bfbbd74795a933f8b0

                                    SHA256

                                    71f9c4bfdc78cf5ed7132b206f4bed6a1e5c7c80283d1a15b9e8e608f6cc3174

                                    SHA512

                                    dfdbb0b5b724890a2b6703f64cabd35b15c6bf77c1dcefd6ffd2ac1ad8fa163488634bc04650aeed322d25126da5a141fdf64e6e6059f367c58833f7d1e5fe7f

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    c3cbf3b26c7da3db03c1f7a08d251081

                                    SHA1

                                    a9970beead4d333220f86e809aac0c15bd3399a7

                                    SHA256

                                    88ce70232796105435133eb67b1936f34f35a90bac96b1414cdc6b9f22a9e8c9

                                    SHA512

                                    285a1cc02ae77994654ea36c571c1791a7a96d75e39a29a4f652608dbcaef7816dfdd53c2879cf3d95da03f13d33652d021e2313698b47bb8dd21778c67d3e04

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_asyncio.pyd

                                    Filesize

                                    69KB

                                    MD5

                                    477dba4d6e059ea3d61fad7b6a7da10e

                                    SHA1

                                    1f23549e60016eeed508a30479886331b22f7a8b

                                    SHA256

                                    5bebeb765ab9ef045bc5515166360d6f53890d3ad6fc360c20222d61841410b6

                                    SHA512

                                    8119362c2793a4c5da25a63ca68aa3b144db7e4c08c80cbe8c8e7e8a875f1bd0c30e497208ce20961ddb38d3363d164b6e1651d3e030ed7b8ee5f386faf809d2

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_bz2.pyd

                                    Filesize

                                    83KB

                                    MD5

                                    5bebc32957922fe20e927d5c4637f100

                                    SHA1

                                    a94ea93ee3c3d154f4f90b5c2fe072cc273376b3

                                    SHA256

                                    3ed0e5058d370fb14aa5469d81f96c5685559c054917c7280dd4125f21d25f62

                                    SHA512

                                    afbe80a73ee9bd63d9ffa4628273019400a75f75454667440f43beb253091584bf9128cbb78ae7b659ce67a5faefdba726edb37987a4fe92f082d009d523d5d6

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_decimal.pyd

                                    Filesize

                                    251KB

                                    MD5

                                    492c0c36d8ed1b6ca2117869a09214da

                                    SHA1

                                    b741cae3e2c9954e726890292fa35034509ef0f6

                                    SHA256

                                    b8221d1c9e2c892dd6227a6042d1e49200cd5cb82adbd998e4a77f4ee0e9abf1

                                    SHA512

                                    b8f1c64ad94db0252d96082e73a8632412d1d73fb8095541ee423df6f00bc417a2b42c76f15d7e014e27baae0ef50311c3f768b1560db005a522373f442e4be0

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_hashlib.pyd

                                    Filesize

                                    64KB

                                    MD5

                                    da02cefd8151ecb83f697e3bd5280775

                                    SHA1

                                    1c5d0437eb7e87842fde55241a5f0ca7f0fc25e7

                                    SHA256

                                    fd77a5756a17ec0788989f73222b0e7334dd4494b8c8647b43fe554cf3cfb354

                                    SHA512

                                    a13bc5c481730f48808905f872d92cb8729cc52cfb4d5345153ce361e7d6586603a58b964a1ebfd77dd6222b074e5dcca176eaaefecc39f75496b1f8387a2283

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_multiprocessing.pyd

                                    Filesize

                                    34KB

                                    MD5

                                    2bd43e8973882e32c9325ef81898ae62

                                    SHA1

                                    1e47b0420a2a1c1d910897a96440f1aeef5fa383

                                    SHA256

                                    3c34031b464e7881d8f9d182f7387a86b883581fd020280ec56c1e3ec6f4cc2d

                                    SHA512

                                    9d51bbd25c836f4f5d1fb9b42853476e13576126b8b521851948bdf08d53b8d4b4f66d2c8071843b01aa5631abdf13dc53c708dba195656a30f262dce30a88ca

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_overlapped.pyd

                                    Filesize

                                    54KB

                                    MD5

                                    7e4553ca5c269e102eb205585cc3f6b4

                                    SHA1

                                    73a60dbc7478877689c96c37107e66b574ba59c9

                                    SHA256

                                    d5f89859609371393d379b5ffd98e5b552078050e8b02a8e2900fa9b4ee8ff91

                                    SHA512

                                    65b72bc603e633596d359089c260ee3d8093727c4781bff1ec0b81c8244af68f69ff3141424c5de12355c668ae3366b4385a0db7455486c536a13529c47b54ef

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_queue.pyd

                                    Filesize

                                    31KB

                                    MD5

                                    b7e5fbd7ef3eefff8f502290c0e2b259

                                    SHA1

                                    9decba47b1cdb0d511b58c3146d81644e56e3611

                                    SHA256

                                    dbdabb5fe0ccbc8b951a2c6ec033551836b072cab756aaa56b6f22730080d173

                                    SHA512

                                    b7568b9df191347d1a8d305bd8ddd27cbfa064121c785fa2e6afef89ec330b60cafc366be2b22409d15c9434f5e46e36c5cbfb10783523fdcac82c30360d36f7

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_tkinter.pyd

                                    Filesize

                                    64KB

                                    MD5

                                    276791cca50a8b8a334d3f4f9ff520e2

                                    SHA1

                                    c0d73f309ef98038594c6338c81606a9947bd7f8

                                    SHA256

                                    a1c74836bad3d9b0aaec8dccd92e552b5ad583bfea7ef21cd40713a265d94f7e

                                    SHA512

                                    ef1ed2eacf86885531fc0963c84c1c99773d963d5a709030df6cfee5027604e1402a55b6fe26019a3ab922fd27895d0e2ef5572a50195372b1bfb1539eac0dd0

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_wmi.pyd

                                    Filesize

                                    36KB

                                    MD5

                                    8a9a59559c614fc2bcebb50073580c88

                                    SHA1

                                    4e4ced93f2cb5fe6a33c1484a705e10a31d88c4d

                                    SHA256

                                    752fb80edb51f45d3cc1c046f3b007802432b91aef400c985640d6b276a67c12

                                    SHA512

                                    9b17c81ff89a41307740371cb4c2f5b0cf662392296a7ab8e5a9eba75224b5d9c36a226dce92884591636c343b8238c19ef61c1fdf50cc5aa2da86b1959db413

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libcrypto-3.dll

                                    Filesize

                                    5.0MB

                                    MD5

                                    e547cf6d296a88f5b1c352c116df7c0c

                                    SHA1

                                    cafa14e0367f7c13ad140fd556f10f320a039783

                                    SHA256

                                    05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de

                                    SHA512

                                    9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libffi-8.dll

                                    Filesize

                                    38KB

                                    MD5

                                    0f8e4992ca92baaf54cc0b43aaccce21

                                    SHA1

                                    c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                                    SHA256

                                    eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                                    SHA512

                                    6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libssl-3.dll

                                    Filesize

                                    768KB

                                    MD5

                                    19a2aba25456181d5fb572d88ac0e73e

                                    SHA1

                                    656ca8cdfc9c3a6379536e2027e93408851483db

                                    SHA256

                                    2e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006

                                    SHA512

                                    df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\pydantic_core\_pydantic_core.pyd

                                    Filesize

                                    4.8MB

                                    MD5

                                    690702355f29deaf8bad019fe8be4bd7

                                    SHA1

                                    fbd12b4934e0c7a0271eabbc45af2511b37193bc

                                    SHA256

                                    1f763dbdef13beadf8fc2e4abf4cfed64c3c458730484dfea53e2b12b1fb081e

                                    SHA512

                                    e796e446c56222111e7a1b78d1e389b130d7406eaf66024acac8d57109f201298c93b9ccc3e09c4ccf9f60a4d75a59c417dd3919079dd56be832880aa73ac00d

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pyd

                                    Filesize

                                    30KB

                                    MD5

                                    d0cc9fc9a0650ba00bd206720223493b

                                    SHA1

                                    295bc204e489572b74cc11801ed8590f808e1618

                                    SHA256

                                    411d6f538bdbaf60f1a1798fa8aa7ed3a4e8fcc99c9f9f10d21270d2f3742019

                                    SHA512

                                    d3ebcb91d1b8aa247d50c2c4b2ba1bf3102317c593cbf6c63883e8bf9d6e50c0a40f149654797abc5b4f17aee282ddd972a8cd9189bfcd5b9cec5ab9c341e20b

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\tk86t.dll

                                    Filesize

                                    1.5MB

                                    MD5

                                    4cdd92e60eb291053d2ad12bf0710749

                                    SHA1

                                    31424e8d35459ba43672f05abba1e37c23f74536

                                    SHA256

                                    b30576b60aee548838243601952a05b70a9fc937f5a607f6b1413cd5ed04d900

                                    SHA512

                                    80c3bb58817578708e14ba173bfbe8f62fb54efa22feb8ff08b9eefa4462b74062654f956f965c7caa8aa16295229b58ef9eea8d2c4c94652bde1e61038e6ffe

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\watchfiles\_rust_notify.pyd

                                    Filesize

                                    631KB

                                    MD5

                                    0e84842bd809a278fda8046707c6a41a

                                    SHA1

                                    a8ed45fc64e5ae116a934afc24d2c6a98e5ab560

                                    SHA256

                                    5399f94e7b32253749ff2ec0839ddb5f2e76c2bcf12416507411a52986098662

                                    SHA512

                                    083c3f33a31fa7a43eda16f95053994f4ebb9ca9eb657deeb1e493a9c0874f2fa0faa95773c4a992b52d572e74c790bba776cd558981219d56f74a8b97cc6537

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1880_133721296395540730\VCRUNTIME140.dll

                                    Filesize

                                    116KB

                                    MD5

                                    be8dbe2dc77ebe7f88f910c61aec691a

                                    SHA1

                                    a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                    SHA256

                                    4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                    SHA512

                                    0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1880_133721296395540730\_ctypes.pyd

                                    Filesize

                                    122KB

                                    MD5

                                    fb454c5e74582a805bc5e9f3da8edc7b

                                    SHA1

                                    782c3fa39393112275120eaf62fc6579c36b5cf8

                                    SHA256

                                    74e0e8384f6c2503215f4cf64c92efe7257f1aec44f72d67ad37dc8ba2530bc1

                                    SHA512

                                    727ada80098f07849102c76b484e9a61fb0f7da328c0276d82c6ee08213682c89deeb8459139a3fbd7f561bffaca91650a429e1b3a1ff8f341cebdf0bfa9b65d

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1880_133721296395540730\_lzma.pyd

                                    Filesize

                                    156KB

                                    MD5

                                    195defe58a7549117e06a57029079702

                                    SHA1

                                    3795b02803ca37f399d8883d30c0aa38ad77b5f2

                                    SHA256

                                    7bf9ff61babebd90c499a8ed9b62141f947f90d87e0bbd41a12e99d20e06954a

                                    SHA512

                                    c47a9b1066dd9744c51ed80215bd9645aab6cc9d6a3f9df99f618e3dd784f6c7ce6f53eabe222cf134ee649250834193d5973e6e88f8a93151886537c62e2e2b

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1880_133721296395540730\_socket.pyd

                                    Filesize

                                    81KB

                                    MD5

                                    dd8ff2a3946b8e77264e3f0011d27704

                                    SHA1

                                    a2d84cfc4d6410b80eea4b25e8efc08498f78990

                                    SHA256

                                    b102522c23dac2332511eb3502466caf842d6bcd092fbc276b7b55e9cc01b085

                                    SHA512

                                    958224a974a3449bcfb97faab70c0a5b594fa130adc0c83b4e15bdd7aab366b58d94a4a9016cb662329ea47558645acd0e0cc6df54f12a81ac13a6ec0c895cd8

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1880_133721296395540730\_ssl.pyd

                                    Filesize

                                    174KB

                                    MD5

                                    c87c5890039c3bdb55a8bc189256315f

                                    SHA1

                                    84ef3c2678314b7f31246471b3300da65cb7e9de

                                    SHA256

                                    a5d361707f7a2a2d726b20770e8a6fc25d753be30bcbcbbb683ffee7959557c2

                                    SHA512

                                    e750dc36ae00249ed6da1c9d816f1bd7f8bc84ddea326c0cd0410dbcfb1a945aac8c130665bfacdccd1ee2b7ac097c6ff241bfc6cc39017c9d1cde205f460c44

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1880_133721296395540730\python312.dll

                                    Filesize

                                    6.6MB

                                    MD5

                                    d521654d889666a0bc753320f071ef60

                                    SHA1

                                    5fd9b90c5d0527e53c199f94bad540c1e0985db6

                                    SHA256

                                    21700f0bad5769a1b61ea408dc0a140ffd0a356a774c6eb0cc70e574b929d2e2

                                    SHA512

                                    7a726835423a36de80fb29ef65dfe7150bd1567cac6f3569e24d9fe091496c807556d0150456429a3d1a6fd2ed0b8ae3128ea3b8674c97f42ce7c897719d2cd3

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1880_133721296395540730\tcl86t.dll

                                    Filesize

                                    1.7MB

                                    MD5

                                    108d97000657e7b1b95626350784ed23

                                    SHA1

                                    3814e6e5356b26e6e538f2c1803418eb83941e30

                                    SHA256

                                    3d2769e69d611314d517fc9aad688a529670af94a7589f728107180ae105218f

                                    SHA512

                                    9475cd1c8fe2e769ed0e8469d1f19cdf808f930cccc3baf581888a705f195c9be02652168d9c1c25ba850502f94e7eb87687c2c75f0f699c38309bc92b9004a0

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1880_133721296395540730\vcruntime140_1.dll

                                    Filesize

                                    48KB

                                    MD5

                                    f8dfa78045620cf8a732e67d1b1eb53d

                                    SHA1

                                    ff9a604d8c99405bfdbbf4295825d3fcbc792704

                                    SHA256

                                    a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

                                    SHA512

                                    ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1880_133721296395540730\zlib1.dll

                                    Filesize

                                    143KB

                                    MD5

                                    fa87d95aa4f9348d3f3b75d62a23658d

                                    SHA1

                                    b8829e2ec83b1950ae013be60ed3e7616ce2ed80

                                    SHA256

                                    21feea753a6f991f01bcf9d30afada06eca3a105e97d5d81998ef359c4fc86a3

                                    SHA512

                                    cb965cfc905b7c588bd2009d4915973a004de658b6153de9fe2ae8b27c5612b56de14b95499ec050b70d16f89f0313cd81a3afa827a30c38aa206e44c11ef283

                                  • C:\Users\Admin\Downloads\SynXRemakeV1.0.6.zip

                                    Filesize

                                    42.4MB

                                    MD5

                                    fbc7cc9c5aace9be94690d504573a3fe

                                    SHA1

                                    ce3e379ae3b25d010c100d4f31c0b5161b13ad4d

                                    SHA256

                                    9f2138718901b749d27e7637dd128c4fcea90cbdd80fb81b2d4d5f4f06e932b6

                                    SHA512

                                    3b6d7f66f1701716013b4cec87369400a7d4978221d63f7bb312fb801c4b69163053309079a2e41c51551b16512bd43df3a660afde78fafa602ef5e7fc7c7285

                                  • C:\Users\Admin\Downloads\SynXRemakeV1.0.6\SynXRemakeV1.0.6\bin\CurrentVersion.txt

                                    Filesize

                                    5B

                                    MD5

                                    ea9495d53d78b5a6cd250a78ead42aa0

                                    SHA1

                                    e2a02d1a2891c9d664dc63af02f69c8cbfed92f9

                                    SHA256

                                    a61552bd969df8ea8acbc43ca7288cbb4d5d38365a610c8021a427e26a51851d

                                    SHA512

                                    3aed7dead7f449a023df53d6065c1a17693756d40db53d3f93145f3ed7e6c940cb809175da2170ae8184e6e5c7735e91cde883a663be7a0913df874591c24b24

                                  • memory/3744-96-0x000000000AFC0000-0x000000000AFCE000-memory.dmp

                                    Filesize

                                    56KB

                                  • memory/3744-90-0x0000000005990000-0x0000000005A22000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/3744-88-0x00000000007D0000-0x00000000007E4000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/3744-91-0x0000000005BC0000-0x0000000005C50000-memory.dmp

                                    Filesize

                                    576KB

                                  • memory/3744-89-0x00000000052F0000-0x0000000005300000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3744-94-0x000000000AF40000-0x000000000AF48000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/3744-95-0x000000000AFF0000-0x000000000B028000-memory.dmp

                                    Filesize

                                    224KB