Analysis
-
max time kernel
52s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
OperaGXSetup (1).exe
Resource
win7-20240708-en
General
-
Target
OperaGXSetup (1).exe
-
Size
3.2MB
-
MD5
03ab9b24d994fc46176776a167e087ec
-
SHA1
281c9564a9f7b9387b8cd78afe6455db8b2050cf
-
SHA256
f9db61e24f3797ff523b7aefb01b6e0f52c206d4ea9fbcde8005d83c468a3d25
-
SHA512
eeccfad1a00a17331a56ad511b1f109317335eb8b9bcaf3245e290ce2e20a631291977d3b8cce22223695c3c630b940d4ffc76d62f1e1cb5868e4f2e5f299976
-
SSDEEP
98304:qA8nd05UHPD5oiuFSYyzl0sLKpO1fu8eiWO:OHPD5H3hl0sWih3H
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1724 setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OperaGXSetup (1).exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe 1988 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2144 1988 chrome.exe 33 PID 1988 wrote to memory of 2144 1988 chrome.exe 33 PID 1988 wrote to memory of 2144 1988 chrome.exe 33 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2716 1988 chrome.exe 35 PID 1988 wrote to memory of 2132 1988 chrome.exe 36 PID 1988 wrote to memory of 2132 1988 chrome.exe 36 PID 1988 wrote to memory of 2132 1988 chrome.exe 36 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37 PID 1988 wrote to memory of 2808 1988 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\OperaGXSetup (1).exe"C:\Users\Admin\AppData\Local\Temp\OperaGXSetup (1).exe"1⤵
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\7zS0D57C1E6\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS0D57C1E6\setup.exe --server-tracking-blob=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2⤵
- Executes dropped EXE
PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6329758,0x7fef6329768,0x7fef63297782⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:22⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:82⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1580 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2276 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1384 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:22⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2968 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3456 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:82⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3572 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3572 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:82⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3768 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1880 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:82⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2804 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3752 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2032 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2036 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=1048 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=284 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4184 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:82⤵PID:1284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4152 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:82⤵PID:604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=4188 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=3828 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=1488 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=4236 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=696 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=4524 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:82⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 --field-trial-handle=1356,i,6412679715725155274,6899556854542974500,131072 /prefetch:82⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2856
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:912
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_synapse-v2-launcher-12-5-22 (1).zip\README.txt1⤵PID:2624
-
C:\Users\Admin\Downloads\synapse-v2-launcher-12-5-22 (1)\Synapse Launcher.exe"C:\Users\Admin\Downloads\synapse-v2-launcher-12-5-22 (1)\Synapse Launcher.exe"1⤵PID:1716
-
C:\Users\Admin\Downloads\synapse-v2-launcher-12-5-22 (1)\Synapse Launcher.exe"C:\Users\Admin\Downloads\synapse-v2-launcher-12-5-22 (1)\Synapse Launcher.exe"1⤵PID:396
-
C:\Users\Admin\Downloads\synapse-v2-launcher-12-5-22 (1)\Synapse Launcher.exe"C:\Users\Admin\Downloads\synapse-v2-launcher-12-5-22 (1)\Synapse Launcher.exe"1⤵PID:1732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb5197006ccdb40f53446a5d5fa383c0
SHA11246fa86da1fefdb9526f5cc736eeca461d5c814
SHA256cd1f6286ae308db822de0099fba5c62483946624ad4cc4882c295e5924121312
SHA512fa6162291b64925d8e3ee3943d723ea17be8e0c95b29508f6954f75a218ae7446337c99d0f5d0d395c6be60491675b18d4fc659d10a3f2ff20eab454df103e6d
-
Filesize
29KB
MD5455cc6c3d25e197d9647dd42676644c8
SHA17c5d524bc0a529d921eae5dbabd02b0df9c223bd
SHA256d497d6bc810ed94b71d2e001768c9fc043aa8ca888864b44ce143b695ce01599
SHA512e8d198f81f73d8daeb351b8330d9791f59d59f511a7fdeba6faffd9e177512f800f8ae142a1d58df97f249f3be7a3bbc8b3139ff0f3a3bfca898d077aa4cd743
-
Filesize
31KB
MD56e848fe6c5045f265abb3ee3967eca49
SHA1b2fdfe3700ac53d45eb2211c541dd68d353263d8
SHA2566bec4063d074aadfcbdee7eb7e62f58b6406bc3ab59f273d0b4bca52d45946e1
SHA5120d6737464a3bc6996cf656b72cba4ef019c737ca4716dbfb711de80256ea2a02339a5fc56e319c23e92f07c9efdd1c36a4533daf58dbf03fb6775955dcf3ba68
-
Filesize
20KB
MD50847f502f3670eeee3c2b5cd93c8db94
SHA1984881be882fea76d390d373222c08f34cc7a31b
SHA256bede435865df71b9152966ba6e550b07ae481f795dd2b69063add1e99bf6c23d
SHA5122eadbe0158bb6a8c19016cd5fee52c4efefc3ae2e8655c16300cd449f1774ee875594c6f7826ac7c4c9dfe215a5c9acafdcb68b8bffa00a70468598aa3b46c0c
-
Filesize
351KB
MD5b03b887ae392b6f33fad562becfc0482
SHA1101c2388c16ca7678a8426739ec7a1b505a6f6aa
SHA25693db5f4e53b9c0514b9c0c4c562be8d8e7c3d64f8542c03b7e7f032a9c5d0c55
SHA5120c1cd2e1f5c32b76aa8c994b6399acf81c6f9e2558e120d2eefcde9628a162fa4c3c74aae519a59640f49ee6ca1a33f3faeeaea5e8c02aef9749af0c74d4dc73
-
Filesize
1KB
MD5bf9fe51be8fd83013b5f9f77152ab97e
SHA11b28deb246cc04fc04ac6d91dfe6bc0f4b324ea8
SHA256ca90f4b3f137013beec1c946d0aae36e5105d14e19d74f42d1a2591bcb8f0b63
SHA512346787b4b76769a7c737efa8946feb48087a64d10f827c3079b33a05aff6222174e7ea5882cfbecdb8c08eb1ff2d21355915393e9eda9acabf42492c3340b18c
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RFf77d865.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
6KB
MD54f67ae992541669939d3cc1f7d19ed49
SHA1ec090824f6b5af95fc23c1c3fa5656f4f4cc657f
SHA256c82b0513697f1f2e233452b4aeb64eb547a5255118d3e0fe4d8de0326e9e1e36
SHA512df4693c37e4cbcf5e7d0933d814f96f2b0180903df6483dc66e60180317b30940f827251c5ab5b72df5ef7168e9e299ded50c42d5112166413dd9806614f7a26
-
Filesize
1017B
MD5a7e47fef95bd8468ea0bba602d557858
SHA1a1ca4f10a923f7929ead25e45d0dd215789e6891
SHA2564ba1411b892503ea869c660d9f602de390e2f223e0b73c9dc2079ef1ee9353bb
SHA512f49b97b12fc285b9e35c017c9925980426acc6d32acef458964209e58bbfbf3f69d5e30d03263150d7c68bbd790eb8fafe84853c6b5d5ca974319da83f808d22
-
Filesize
1KB
MD5dc05bd3eb5ba862f76ed6669a1ce41f9
SHA1a97d2dde282b14bd40f1883ac0a41e2c13b9fda6
SHA256125c54fa0554ab4859be97b3bb96eb10b71aa9ca1ad0c10e24118e6b1dd884ce
SHA512b1ff9b3c5e56c28c8e53ff86645cef3322274baa2e2f95cc5937a8f8bf83d2d462b47d9545d300083285b01046ecdbd40d246fe6f1bf6f802d3a556c9a9c7480
-
Filesize
690B
MD5b8060ccac7a78387a5271b16abfceea7
SHA143915d3f5269947a87b7ea128fd6a4d1fab18062
SHA256470e60824a93951b80bcced9fc23e74e6a9215009510324a21b5fa15d43660d6
SHA512c57ce9d7efdb3e0b770467eb3fc5f3af9429f463688c769e7a18111ece033aedadca1ff5dba2507ba3d3da65e7f76d16861b2d6fe145536d0784807348dc0771
-
Filesize
853B
MD58270e1f54e6a6c6b5684476b9dc02f3e
SHA193dae315cfa37d9ba7058b8354a88b1ddaee657f
SHA256f90fd48554a007cc02b18f324fe0dccd8506510b996b9a793c556f134971e8c8
SHA512810ac044ffa626aba4ff1b2021229d981fe36815f96c03514812ee465b5684816c249fbb56f1ab9b32d2f5ff68619d732b9129bd64eda3ac024460f49f4ee688
-
Filesize
853B
MD57721fc28b0053fd131885b96dccfaf72
SHA1e817d7c3c066de6490bb24ee648896e53b1056ae
SHA256601ea7704263fdc4a64cccc659ebd91b14f9c96dc6a7f96ac90b41109e054125
SHA5126ebd4b4b3a854f7bd59c2dcfc0ecd6f8fe289303e4080c94b2f5d30be999a0cf80164b9dd5624a78597714939b03beff527245c7448fdb3dc3b835283d3d00b4
-
Filesize
363B
MD56a0546048f4d79bbd4199e9d70814bfc
SHA1f41d3435bc0cbda57d6e731b84cd1bab4fdd94ac
SHA25669c420ed137443f3328f69de6412259e756e23b8f8a011a62b20c855372a46db
SHA512aff2faf2cba829c38b7d789a80bc145575f1652231a6abcd7ad0a45d02801a7796078dbbfb48ee04c926a0bf8ec35ff9208898ef3cb7881cf81c9926ce9e9bce
-
Filesize
6KB
MD53c9f79c51223fcdf062a1699759dfd82
SHA118b500071b26b3ceebb4ba89e62ccec1386fee3c
SHA25621ec0d7fd1cce57e512567e6896fabd3b449b941169bd58c5fe13aba3b8cd849
SHA5123db4ce4df66bc73e0226efc52a871d736e12ffc796a40407b070bd09b0b854d3f53935904dc2954c86b7e17dd2d56800f54674081563fa03d4759862469fe94c
-
Filesize
6KB
MD5a72f8e86b3aa64b30f8147c846f015a0
SHA1de65c59a9da61b86391389ec36b8ddc8371a64db
SHA256cb675fd9ca6121e3e8ec598fa75d9c0c26b9876e92a6392926f1ab20bf89a5a0
SHA5127c9ff8b961194dc2ea815a2cf6993b61294fa315a27b1adce76aa105a632a8e3e7ca4ab535bb9893443d8cb5d644807d0647f9f2380b109f35d2905514215313
-
Filesize
6KB
MD5b6c67b8fcea7d4b7f5e92434e577e050
SHA1d8f658cc9acef5790189fc92931d3ba6e2395115
SHA25649f6ba1d6e67c565448daf52eb4e9d93e782ec4448f85d6f1941c5f0448a6131
SHA51202197dcb841b781d8bb6010ace45947cb6cc934efe54d5b9106e946fc6517d9e3b28d7af479ec9420ac199c60851a9cac426fd7fe81eca9ae97e7aaa03055713
-
Filesize
6KB
MD518cfb6d1f91500bb12f2ae5cac912243
SHA1d5128686d998073b60d196e6f89570c28f8f2fd8
SHA2564a4a4d142c7e599576e89ac8b1365bd4c0f0f22ac9b2289b4cee377735faeeda
SHA5121063c45556dd8edc7d12ec82fed5f2fdfedb7e62cf80349f7f94775b32a987f22ff4d08ea7ed5d4eab3e941c646ec1734d8fa81a30c6c74569651403c8a9abde
-
Filesize
6KB
MD5413ee4d76dfbe852e099b741627d640f
SHA1368e65093920e19296b7c80571fa49e218c39f97
SHA256154d4c3a8ee58cfb9205ed8fa2980ae793830fcdb3c422d50927cb9ac24dac21
SHA5124ee347b7f5c1f7037f53963dbe1d5e330426262c94bc1790b53976a8c2dec658c9e2f88c80e92569b8a173df2f9733d175471434598a836485c09ce335f3858a
-
Filesize
5KB
MD5a38e93add8d4d62bf11a56b6451c2a0b
SHA17c21b1c7e40a5d5c8daac92cd6c433546341d058
SHA2561ab058a3fdcb72ab3020267c998679ab72b2cf88a2f2271208516cda5168e730
SHA512ef3095f5e4df16c4a5e2f8d606ec4993409dff6eea6f5911d75462a63637207ece9a3743a36a909ae12e6c3e8dafabcac629f08a1ee432dddc916906aea2e45c
-
Filesize
7KB
MD52e2e3ff7436d01feb8c9b987bcdc3108
SHA1f3aad4877e97fd1373e38780695febda23367f78
SHA2566df36f42c496ae0de5d4493389fff66ee8f508f8cbf1306d6e45e398c0c6d1d7
SHA512c6960b3e6d418d8f15530d12a50726838fff1a8fec40adff749078f97c59ecc183723d0e5cfd997e6fcf61697d79835e78971299380831ebe09a43265b5bf5c0
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
327KB
MD50aa8856eaede3eb89e35f13de1693310
SHA1ef31fdaa89abe3201a011c4bd217ef310cbb3134
SHA256d7a57acf6e16bbb8a08bcddf0ef5a7fe4d9502a2b0b3085ca0b1193c197d3d23
SHA512ab8b43585167e5a5586684964824227cde587b581d66886a2f93b07c94a38b60d62b761defd08839a87e069fbdfa18ac8b50dfe955bb9fa5b227a647db935bbf
-
Filesize
327KB
MD52884c73c444dcb7ade0370e7f0a79791
SHA185cc602b3218cbbe542facd05d476e0b0ce7bd09
SHA2563c449dc6daa20d2a436b3ac4f6d7dcf73624481d8ce781b40e4dc6d8cfa739df
SHA5129fcf15e061f151ebfd34d6aad254bbcca7b2051f0a895349950eb3e62b7f157f3a6bcfd5bb6064f4cd14daa20dd586d356eb09b2363593c0ecf1ac724882e7d3
-
Filesize
327KB
MD5fc9be66598fa97a52ff09728114d2ca9
SHA1c0e0264dd0d670910b2739dca979fba65f7b02b6
SHA25697115085e651160d70872fa37d4df3b55801d634962fe55242443a13580d2e01
SHA51291e016020cab09989b6e647e774a3b649e79378cf27337791d265bc1dab153058899ca844a28b7451d920703dd407854dc9115205d426d766831a09f4e59fb09
-
Filesize
77KB
MD5e9f6277d6466420f6c7913eb2e31c7cd
SHA1c2e027fe33d9fd15268cc8a8282db02f4ebd3576
SHA2562f8cf537c72eac46ebcb010e2e9277e8f4bea9373a418b3f987362e710ce672c
SHA5128a34e2602999a726689575391e2e4a2827926908b253a124fa681c0369afa7497a4a6d79e3dc2baac6ebb59a6357a606b12daf57bba9b43fd5360156eb9ebd5e
-
Filesize
83KB
MD5fad793bcc922fe68cc68c06b87bd4dfc
SHA1ff8a960fa97bede390dd752b1310740b4714b35f
SHA25659421bf1e3bca6e20e7682414199adf84ca9553c867309e9c1204473a683fa11
SHA512160b201d41755fe10bbf1e292f96c32cd0726d3d279bdf2d61a860b08eef1e743aea3c6c5af0d4e9aad977e743048ad7a0af47ff8dd4fafe9259a05ebeed5123
-
Filesize
6.5MB
MD5f3fb308a1192b6f23b9798274a7bbd3d
SHA1594d0b878169de95f5c29766e24fb905b05afd48
SHA2569c1da80efd2e6ed2a89bbf18da614a85f7d6db55f100fe3a35e9c939ffb29eea
SHA51296e712bb441489d1b95b771914e9792c35b39e4296f0cc9e37cadf4dd470572b0c575233c004ca4e16e525042f80af600c0139ddef0d258fd6cdda92fdd54444
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b