Overview
overview
6Static
static
3Evon.zip
windows10-1703-x64
1Evon/Evon....re.dll
windows10-1703-x64
3Evon/FluxAPI.dll
windows10-1703-x64
1Evon/Fluxt...PI.dll
windows10-1703-x64
1Evon/KrnlAPI.dll
windows10-1703-x64
1Evon/Oxygen API.dll
windows10-1703-x64
1Evon/bin/Monaco.html
windows10-1703-x64
6Evon/bin/v...ain.js
windows10-1703-x64
1Evon/bin/v...bat.js
windows10-1703-x64
1Evon/bin/v...fee.js
windows10-1703-x64
1Evon/bin/v...cpp.js
windows10-1703-x64
1Evon/bin/v...arp.js
windows10-1703-x64
1Evon/bin/v...csp.js
windows10-1703-x64
1Evon/bin/v...css.js
windows10-1703-x64
1Evon/bin/v...ile.js
windows10-1703-x64
1Evon/bin/v...arp.js
windows10-1703-x64
1Evon/bin/v.../go.js
windows10-1703-x64
1Evon/bin/v...ars.js
windows10-1703-x64
1Evon/bin/v...tml.js
windows10-1703-x64
1Evon/bin/v...ini.js
windows10-1703-x64
1Evon/bin/v...ava.js
windows10-1703-x64
1Evon/bin/v...ess.js
windows10-1703-x64
1Evon/bin/v...lua.js
windows10-1703-x64
1Evon/bin/v...own.js
windows10-1703-x64
1Evon/bin/v...dax.js
windows10-1703-x64
1Evon/bin/v...sql.js
windows10-1703-x64
1Evon/bin/v...e-c.js
windows10-1703-x64
1Evon/bin/v...6x.svg
windows10-1703-x64
1Evon/bin/v...6x.svg
windows10-1703-x64
1Evon/bin/v...in.css
windows10-1703-x64
3Evon/bin/v...te.svg
windows10-1703-x64
1Evon/version.data
windows10-1703-x64
3Analysis
-
max time kernel
600s -
max time network
492s -
platform
windows10-1703_x64 -
resource
win10-20230220-es -
resource tags
arch:x64arch:x86image:win10-20230220-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
26-05-2023 11:27
Static task
static1
Behavioral task
behavioral1
Sample
Evon.zip
Resource
win10-20230220-es
Behavioral task
behavioral2
Sample
Evon/Evon.exe.WebView2/EBWebView/Speech Recognition/1.15.0.1/Microsoft.CognitiveServices.Speech.core.dll
Resource
win10-20230220-es
Behavioral task
behavioral3
Sample
Evon/FluxAPI.dll
Resource
win10-20230220-es
Behavioral task
behavioral4
Sample
Evon/Fluxteam_net_API.dll
Resource
win10-20230220-es
Behavioral task
behavioral5
Sample
Evon/KrnlAPI.dll
Resource
win10-20230220-es
Behavioral task
behavioral6
Sample
Evon/Oxygen API.dll
Resource
win10-20230220-es
Behavioral task
behavioral7
Sample
Evon/bin/Monaco.html
Resource
win10-20230220-es
Behavioral task
behavioral8
Sample
Evon/bin/vs/base/worker/workerMain.js
Resource
win10-20230220-es
Behavioral task
behavioral9
Sample
Evon/bin/vs/basic-languages/bat/bat.js
Resource
win10-20230220-es
Behavioral task
behavioral10
Sample
Evon/bin/vs/basic-languages/coffee/coffee.js
Resource
win10-20230220-es
Behavioral task
behavioral11
Sample
Evon/bin/vs/basic-languages/cpp/cpp.js
Resource
win10-20230220-es
Behavioral task
behavioral12
Sample
Evon/bin/vs/basic-languages/csharp/csharp.js
Resource
win10-20230220-es
Behavioral task
behavioral13
Sample
Evon/bin/vs/basic-languages/csp/csp.js
Resource
win10-20230220-es
Behavioral task
behavioral14
Sample
Evon/bin/vs/basic-languages/css/css.js
Resource
win10-20230220-es
Behavioral task
behavioral15
Sample
Evon/bin/vs/basic-languages/dockerfile/dockerfile.js
Resource
win10-20230220-es
Behavioral task
behavioral16
Sample
Evon/bin/vs/basic-languages/fsharp/fsharp.js
Resource
win10-20230220-es
Behavioral task
behavioral17
Sample
Evon/bin/vs/basic-languages/go/go.js
Resource
win10-20230220-es
Behavioral task
behavioral18
Sample
Evon/bin/vs/basic-languages/handlebars/handlebars.js
Resource
win10-20230220-es
Behavioral task
behavioral19
Sample
Evon/bin/vs/basic-languages/html/html.js
Resource
win10-20230220-es
Behavioral task
behavioral20
Sample
Evon/bin/vs/basic-languages/ini/ini.js
Resource
win10-20230220-es
Behavioral task
behavioral21
Sample
Evon/bin/vs/basic-languages/java/java.js
Resource
win10-20230220-es
Behavioral task
behavioral22
Sample
Evon/bin/vs/basic-languages/less/less.js
Resource
win10-20230220-es
Behavioral task
behavioral23
Sample
Evon/bin/vs/basic-languages/lua/lua.js
Resource
win10-20230220-es
Behavioral task
behavioral24
Sample
Evon/bin/vs/basic-languages/markdown/markdown.js
Resource
win10-20230220-es
Behavioral task
behavioral25
Sample
Evon/bin/vs/basic-languages/msdax/msdax.js
Resource
win10-20230220-es
Behavioral task
behavioral26
Sample
Evon/bin/vs/basic-languages/mysql/mysql.js
Resource
win10-20230220-es
Behavioral task
behavioral27
Sample
Evon/bin/vs/basic-languages/objective-c/objective-c.js
Resource
win10-20230220-es
Behavioral task
behavioral28
Sample
Evon/bin/vs/editor/contrib/suggest/media/String_16x.svg
Resource
win10-20230220-es
Behavioral task
behavioral29
Sample
Evon/bin/vs/editor/contrib/suggest/media/String_inverse_16x.svg
Resource
win10-20230220-es
Behavioral task
behavioral30
Sample
Evon/bin/vs/editor/editor.main.css
Resource
win10-20230220-es
Behavioral task
behavioral31
Sample
Evon/bin/vs/editor/standalone/browser/quickOpen/symbol-sprite.svg
Resource
win10-20230220-es
Behavioral task
behavioral32
Sample
Evon/version.data
Resource
win10-20230220-es
General
-
Target
Evon/bin/vs/editor/contrib/suggest/media/String_inverse_16x.svg
-
Size
4KB
-
MD5
6e5c0ce7ec09969f07ea6ee078ef8ad6
-
SHA1
deadc5357a26852d872bffa77d1aa19108603b25
-
SHA256
7d23c0f30cb9c05c81bb15785a3299772ae3cfbe51f3e04895aa1f23ffbeba5b
-
SHA512
2b02cb82f9e4720ee43bfc8b7fe5d6de38228329aafbedb589d5a219057c15f073023deca3c1ca5b65cea4a4f0d863ebd88c889b1d67119639fae2ce180863bf
-
SSDEEP
48:Cn7wkEX+c9Vlt4AFCj93Z0hDC7hSBnukNyhDFtrJGuG2XvS+yZCahDC7hSBnhKHG:EJWFCMcfkCFGE6+yZCacJImkArbbqrAm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133295753385982300" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1532 chrome.exe 1532 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1532 chrome.exe 1532 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1532 wrote to memory of 1648 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 1648 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2248 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2604 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2604 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe PID 1532 wrote to memory of 2004 1532 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\Evon\bin\vs\editor\contrib\suggest\media\String_inverse_16x.svg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff02409758,0x7fff02409768,0x7fff024097782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1704,i,14047766626467417781,703116554109070855,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1948 --field-trial-handle=1704,i,14047766626467417781,703116554109070855,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1704,i,14047766626467417781,703116554109070855,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1704,i,14047766626467417781,703116554109070855,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1704,i,14047766626467417781,703116554109070855,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 --field-trial-handle=1704,i,14047766626467417781,703116554109070855,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1704,i,14047766626467417781,703116554109070855,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 --field-trial-handle=1704,i,14047766626467417781,703116554109070855,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5404f41360ad7915a6920b80ab6fbe561
SHA14c54a86a06b3108b06d52703358bb9341f39e8fd
SHA256f2112028038f6e04ad5e17b0030828796dbbfa71d0e35d6eb34ef753aa8e781c
SHA51256854333faf2fa14d3a4cc73f122c95d6d4c4fd5f618641381df7691831242710ec469b40b7d68af30f7424de5f78ffbcccd531867a83d52118737f067e92c64
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5a792cbcbe17823c2f26f994e1a14341c
SHA19e3c04c25ed67c3e081211b563cbb9a5cfcd20f6
SHA2567e0dfb60e3e1678b2b642a97333262f9c360380b493888a5e0217905b66838e3
SHA512b79fab32ba49db277e32ae55b0e5d49a3093820cb1165989d266f95a4c8e563244fcbc8ab1fd844f507a021de0a5766175d5c812ca99028a4ddbc7ac25d67a7e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD57ba55fd749c71093ca4d9db7adc8d505
SHA1d104fe907ae3022f198079d9cdeee9830ce636d6
SHA256d82121d42f1cd0d758158af5bdd5914530adc1ec96fcdaa6a30617fc2a3cc34a
SHA512a6ea1dd72c196d69499bc45e95b34463da742a97afab22377328f5c6a659cc6bd6012e0f2ce651437ffe19d16b2e931c95b9398e9fe8a1d3d137e333bfe2b9b5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
153KB
MD57c75d63e42b6b7672ad13f63e1e11ddc
SHA10891fa79b8d29db1a0988c34a8138d40137de157
SHA2569b182a81e950c423e74f45a746afa8364bb948a9f56458cde5c1d2a47a0e2175
SHA5121fd0b164e7a2925da38a42cb9be42624703138f9dc287411e203d1bc162992c8878571cdcbebdda4e5d6b297b1859cd118b5b30081cc471e6f1bd0ccaa9f038f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_1532_BBGQOMKHAWBUNNBZMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e