Overview
overview
6Static
static
3Evon.zip
windows10-1703-x64
1Evon/Evon....re.dll
windows10-1703-x64
3Evon/FluxAPI.dll
windows10-1703-x64
1Evon/Fluxt...PI.dll
windows10-1703-x64
1Evon/KrnlAPI.dll
windows10-1703-x64
1Evon/Oxygen API.dll
windows10-1703-x64
1Evon/bin/Monaco.html
windows10-1703-x64
6Evon/bin/v...ain.js
windows10-1703-x64
1Evon/bin/v...bat.js
windows10-1703-x64
1Evon/bin/v...fee.js
windows10-1703-x64
1Evon/bin/v...cpp.js
windows10-1703-x64
1Evon/bin/v...arp.js
windows10-1703-x64
1Evon/bin/v...csp.js
windows10-1703-x64
1Evon/bin/v...css.js
windows10-1703-x64
1Evon/bin/v...ile.js
windows10-1703-x64
1Evon/bin/v...arp.js
windows10-1703-x64
1Evon/bin/v.../go.js
windows10-1703-x64
1Evon/bin/v...ars.js
windows10-1703-x64
1Evon/bin/v...tml.js
windows10-1703-x64
1Evon/bin/v...ini.js
windows10-1703-x64
1Evon/bin/v...ava.js
windows10-1703-x64
1Evon/bin/v...ess.js
windows10-1703-x64
1Evon/bin/v...lua.js
windows10-1703-x64
1Evon/bin/v...own.js
windows10-1703-x64
1Evon/bin/v...dax.js
windows10-1703-x64
1Evon/bin/v...sql.js
windows10-1703-x64
1Evon/bin/v...e-c.js
windows10-1703-x64
1Evon/bin/v...6x.svg
windows10-1703-x64
1Evon/bin/v...6x.svg
windows10-1703-x64
1Evon/bin/v...in.css
windows10-1703-x64
3Evon/bin/v...te.svg
windows10-1703-x64
1Evon/version.data
windows10-1703-x64
3Analysis
-
max time kernel
599s -
max time network
594s -
platform
windows10-1703_x64 -
resource
win10-20230220-es -
resource tags
arch:x64arch:x86image:win10-20230220-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
26-05-2023 11:27
Static task
static1
Behavioral task
behavioral1
Sample
Evon.zip
Resource
win10-20230220-es
Behavioral task
behavioral2
Sample
Evon/Evon.exe.WebView2/EBWebView/Speech Recognition/1.15.0.1/Microsoft.CognitiveServices.Speech.core.dll
Resource
win10-20230220-es
Behavioral task
behavioral3
Sample
Evon/FluxAPI.dll
Resource
win10-20230220-es
Behavioral task
behavioral4
Sample
Evon/Fluxteam_net_API.dll
Resource
win10-20230220-es
Behavioral task
behavioral5
Sample
Evon/KrnlAPI.dll
Resource
win10-20230220-es
Behavioral task
behavioral6
Sample
Evon/Oxygen API.dll
Resource
win10-20230220-es
Behavioral task
behavioral7
Sample
Evon/bin/Monaco.html
Resource
win10-20230220-es
Behavioral task
behavioral8
Sample
Evon/bin/vs/base/worker/workerMain.js
Resource
win10-20230220-es
Behavioral task
behavioral9
Sample
Evon/bin/vs/basic-languages/bat/bat.js
Resource
win10-20230220-es
Behavioral task
behavioral10
Sample
Evon/bin/vs/basic-languages/coffee/coffee.js
Resource
win10-20230220-es
Behavioral task
behavioral11
Sample
Evon/bin/vs/basic-languages/cpp/cpp.js
Resource
win10-20230220-es
Behavioral task
behavioral12
Sample
Evon/bin/vs/basic-languages/csharp/csharp.js
Resource
win10-20230220-es
Behavioral task
behavioral13
Sample
Evon/bin/vs/basic-languages/csp/csp.js
Resource
win10-20230220-es
Behavioral task
behavioral14
Sample
Evon/bin/vs/basic-languages/css/css.js
Resource
win10-20230220-es
Behavioral task
behavioral15
Sample
Evon/bin/vs/basic-languages/dockerfile/dockerfile.js
Resource
win10-20230220-es
Behavioral task
behavioral16
Sample
Evon/bin/vs/basic-languages/fsharp/fsharp.js
Resource
win10-20230220-es
Behavioral task
behavioral17
Sample
Evon/bin/vs/basic-languages/go/go.js
Resource
win10-20230220-es
Behavioral task
behavioral18
Sample
Evon/bin/vs/basic-languages/handlebars/handlebars.js
Resource
win10-20230220-es
Behavioral task
behavioral19
Sample
Evon/bin/vs/basic-languages/html/html.js
Resource
win10-20230220-es
Behavioral task
behavioral20
Sample
Evon/bin/vs/basic-languages/ini/ini.js
Resource
win10-20230220-es
Behavioral task
behavioral21
Sample
Evon/bin/vs/basic-languages/java/java.js
Resource
win10-20230220-es
Behavioral task
behavioral22
Sample
Evon/bin/vs/basic-languages/less/less.js
Resource
win10-20230220-es
Behavioral task
behavioral23
Sample
Evon/bin/vs/basic-languages/lua/lua.js
Resource
win10-20230220-es
Behavioral task
behavioral24
Sample
Evon/bin/vs/basic-languages/markdown/markdown.js
Resource
win10-20230220-es
Behavioral task
behavioral25
Sample
Evon/bin/vs/basic-languages/msdax/msdax.js
Resource
win10-20230220-es
Behavioral task
behavioral26
Sample
Evon/bin/vs/basic-languages/mysql/mysql.js
Resource
win10-20230220-es
Behavioral task
behavioral27
Sample
Evon/bin/vs/basic-languages/objective-c/objective-c.js
Resource
win10-20230220-es
Behavioral task
behavioral28
Sample
Evon/bin/vs/editor/contrib/suggest/media/String_16x.svg
Resource
win10-20230220-es
Behavioral task
behavioral29
Sample
Evon/bin/vs/editor/contrib/suggest/media/String_inverse_16x.svg
Resource
win10-20230220-es
Behavioral task
behavioral30
Sample
Evon/bin/vs/editor/editor.main.css
Resource
win10-20230220-es
Behavioral task
behavioral31
Sample
Evon/bin/vs/editor/standalone/browser/quickOpen/symbol-sprite.svg
Resource
win10-20230220-es
Behavioral task
behavioral32
Sample
Evon/version.data
Resource
win10-20230220-es
General
-
Target
Evon/bin/Monaco.html
-
Size
70KB
-
MD5
8376a0234b6a77d02648ccfb76759bbe
-
SHA1
617c9f9c623c139c1546e1c6e367fcd3c4cb293a
-
SHA256
1715131f85de31e755fe0453c6c44fd10acfdd18577c60ad688e8bd309603d41
-
SHA512
89376e23c44678c0d418bdf30f448ced9d69b8d6c4a509c33076e3e091c91f559016657e6bdfe01f5ef906c0e74bd1156d96abed5d33db4d011c3ed0174fd217
-
SSDEEP
1536:AwmVPlSG/xJ4RyTbNfBf8XT/p/gmFwZKvWPvGVW2P2zVf3xgoaC:3mVPlSaJ4RyTbNfBf8XT/p/gmFwKWPvT
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133295813235887050" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exepid process 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3352 chrome.exe 3352 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3712 chrome.exe 3712 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3712 wrote to memory of 2476 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 2476 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4388 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 1972 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 1972 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe PID 3712 wrote to memory of 4660 3712 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\Evon\bin\Monaco.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd877e9758,0x7ffd877e9768,0x7ffd877e97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1704 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1340 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3572 --field-trial-handle=1908,i,8345300983576764209,13713903315061869299,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
653B
MD583efe0ea0a23ab6f6d1c9b61351effc0
SHA1925a2cf92859122ecd015c7457daed02b6ac232b
SHA256b219edcdee27124fad72f5835ec5d8e14b9262ad6e809e5d12cf5ee851cc4467
SHA5122bbcebc7bf41f0705effd39b6a3741537231d14135900d6c4e10b8ab134bfca384ee05220477f393331b743afdf73105c2f12ec71dd8cf3421fb120eb625e26d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD567adfef0a4e9c7500b56dd7fb4133e22
SHA12c461c4bcb9dda5e5bd75200c05b27266d712875
SHA256cf3abcf680585fd3e4ded4ce40513b6c1325c270afd38ed45bc39aec16b31882
SHA51293bb6721c96f63b8860c429f217832fc3dc98e7e9ae1302bc0866d0ceb1eb9cb039180f3b288450e26c66c5d710829fb347525bd26a3038dd7c7a75012a606ab
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5f71f9ca82429356dcab00a0fd7db631d
SHA1883f7ae569d4913abda8d939fd1a1104eeb10fde
SHA2569ba3902db71538ac5112de1cd95ed0d5979f7052cec41d8af11c652825f9f084
SHA5129fb2ebfae7336576e24e2a7ff76cf9483d88cfcfbde2e9beaf102b420c5aebf1cbe92faa917d2b5f4e6f35b7715b757edf58093205a19176706141704ad92622
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5ada9f761b12f64f3cd8c0a06dd68706c
SHA12d7af33a744b30219756a78b3026ec564829faed
SHA25641bc5873c36cea96b7069cd6234c352d3868255445d7c037f0e0821b19b21feb
SHA512f68502f8a8bca2b29fea1177dbb32284996f5d33e386dbbbf9c580bf5d9087efe6a93208340917c1f3163969af2ed569c43f92df98a7a3b0a50f639942544f96
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5e18c2cbfd4f3fe9adec089946b814635
SHA1906d55c78cc8ce2af23f8f73db64fe6386f8934d
SHA256d495ef0d4a026d63447d474b7e5c43f6b192880f8643f78311b0075b00e8ab6b
SHA5126668c7a2d85335b0ea76cba0342e1e81b6b65a7ec84b00292f6be0c6fb46860e7cac2374b82a2f1fb5d736e09a1661dadd2eaab3f6fdd94eeeeba9613a6b9b13
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
156KB
MD54b40b665943861ba9d155473f42003e8
SHA1fb1f2c430bb9c9ea5f3b9e174b98ba00ad60688a
SHA2569bdba2563f6f10c808a82db26f3593302c43d83cc542466b8bc7e76e7f7c556e
SHA512934feef64cab326a7be42c0dee49e1c0196da1cd3e4d768d44c1e26c81bdae51553d696b99d80c4fa061907c732e6c5e028d516682b68fecf8e36525b1bab599
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
72KB
MD5381b9215a3f8fd3d1dd9ad1bd81e6e2e
SHA1f81728172e137ada1d00df715a1b17b624c3162a
SHA2561de9a836a95fd1e47bcfea390b53bb12d0f5ab60fb278224d3c215f50f5b4617
SHA5120347d5eb3c4ca9407f1adf467f72ec8a1a4d641aba9909d912606651435ca476d3320e92f43f70537fb0a4bd4d787ec93cfd037f5ce394aecdcc3148b0804613
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
155KB
MD5c6f2754fe904326e356ca6a8168178d3
SHA19d0ff71784addbc440136563aecc45d7f720ddfc
SHA25699469260f8baf29bb0e797908f5325006118258fa4d161f4987c36dc9f0dc0ee
SHA512df1b650df5f205042cacadc4a24208d22f25c1dd1598f10493bdc95b41f1f2079919429e13fc94c8d3497e8c2d7ecc3935e0f021a8fd0fe500985d4c552a00c5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
155KB
MD5c437f0acb606ea474e9c9e1ad0d9ffad
SHA1b14e231db7a41fdfa747145bd84b1b6ce3789836
SHA256aed091177fb4c169ccd8b1276734fb20ad38d64338971e5d9219b681c960e45e
SHA51277280e77455af9e03ed2b0db9f86109cf15f376e68c56ac502cbe343309d85a15bd12a5207cb9d9f9857de78b43980ef936a3d9eb6d1ca4e98883bdaa2982afc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_3712_VYHHUTGNHFLHGIEGMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e