Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 12:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.aarp.org/membership/benefits/campaigns/travel/?cid=ExtDisplay-Discounts-A2165-Facebook-201-080423,
Resource
win10v2004-20230703-en
General
-
Target
https://www.aarp.org/membership/benefits/campaigns/travel/?cid=ExtDisplay-Discounts-A2165-Facebook-201-080423,
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133378736707641121" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4176143399-3250363947-192774652-1000\{0F3E895C-0EAD-40D9-85CF-DA6913C2E655} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 704 chrome.exe 704 chrome.exe 5760 chrome.exe 5760 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 28 IoCs
pid Process 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe Token: SeShutdownPrivilege 704 chrome.exe Token: SeCreatePagefilePrivilege 704 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe 704 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 704 wrote to memory of 2012 704 chrome.exe 81 PID 704 wrote to memory of 2012 704 chrome.exe 81 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 2304 704 chrome.exe 84 PID 704 wrote to memory of 3960 704 chrome.exe 85 PID 704 wrote to memory of 3960 704 chrome.exe 85 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86 PID 704 wrote to memory of 4432 704 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.aarp.org/membership/benefits/campaigns/travel/?cid=ExtDisplay-Discounts-A2165-Facebook-201-080423,1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff936bc9758,0x7ff936bc9768,0x7ff936bc97782⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:22⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:82⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:82⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4676 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5000 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5304 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5320 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5536 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5760 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5956 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5916 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=6904 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=6312 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=7116 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=7100 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=7260 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=7272 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=7028 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=7404 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:5444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=7012 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:5520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8656 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:82⤵PID:5952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8080 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:82⤵PID:6140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=8808 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=7988 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=7836 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:6008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7072 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:82⤵
- Modifies registry class
PID:5708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=7528 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:82⤵PID:5672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=5880 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:5668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=8212 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:5516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=6784 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=5808 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --mojo-platform-channel-handle=6780 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --mojo-platform-channel-handle=8188 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:12⤵PID:348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6140 --field-trial-handle=1864,i,12202556018463524624,11349590986593525094,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5760
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD535f94c639858ef8efc141f9b6ccf7251
SHA1e607c4030b318e870289de91cd4246020561fc62
SHA256468541bff289d6c249e1e9465c26d6f1171d00bda48eb51bbdf08745bb70dbcc
SHA51224cd19a2ff8260390b1d1bb65db349d0aced797114730db014faf8fc3cabd0be4748f2cfa944dfac20821fdce404f3e0aa664a796724c2cd1baa6c20359c49f5
-
Filesize
126KB
MD5b0a08b8f2deee49fee29f251f2aa971c
SHA11cbdb9386209f5430142511364d5bea28ebf8f0f
SHA2561028784ee2753bf4b19cc1fe0e193e8904990526f4da6b5b5efdf6471e93e95e
SHA512bac5f157b1f5c14c6c4b4fda1d839b09eae16e9ea75bd70127eebf8a821a8cced7b70e2933a4b2c35e32cc32cb088790ba3e5738f5665c033e388ff0bb576986
-
Filesize
27KB
MD570dc4f19424ed6d1eb3edf2e3acffdfe
SHA1f5e03c8717997457ab5875098caf342e959c52fb
SHA2564f0529047afe2ad52d6b531440745c009727a374b0302784e5993ad85b3030c5
SHA51292d0562b604a951bcfcea32569343eeee2c400149faa84375b8eab5f4432bf97bb833b5f9c7c287b1f8f1a330bda52cc9a5868cd35a56789beb7ffc1e9cf7580
-
Filesize
23KB
MD5dfd330be969df81841fd25ad0613bad2
SHA1733abaa593ba939dc489b981249da137247fb77f
SHA256155c986f8db4426736b6a539c6d10bedaee582fb059d739a2e2c4b41a3b7fb3c
SHA5128f061fa373c72d934d3b318bea8521c8d6a48a6d6f160857025ec107df51c8fb88f24b4b2cd1345dcf445e235811bd83d0380eb3072133041829e6536dff5fb0
-
Filesize
63KB
MD541025bba1f07ea33cf94fcf0fb4e2920
SHA1576ff116e50f2a699f1b4de01a9bbb210285a860
SHA256f067b318d432807875b3b043edcef6ad3c1ff335af19e21c97004f7c6e3d6119
SHA512f48dd101070b7cb352fb2fa6285dab73efd2b7086c7b0590bb628a5a92ed1af85c11ce1e211e4c98ee4f00800773d1094126167acbb40b35a6c4a39a8a9eb2b5
-
Filesize
70KB
MD504332505e9369f5b69a9380640ed4e79
SHA1d01e91eb088d73ed8ab87340f0768879bf711c05
SHA256c96d681c4e0718bf413c538e0244d0cb0bbe4fa029dc35ce8952a933391b88d4
SHA512307ea5d0940ca498678b7b9755c478e67668b6f03b0ffbbb063f9f58e9af2df089358c262414cf5740b3944ac2ad0e407d7eea808e451a071a6d24a1864c877a
-
Filesize
67KB
MD5dcc4edc89b3162509ca04056334cb25a
SHA16ae1a6b8c26dede90901102e36f780561e813f73
SHA256845c44e63e59923ad082538d165519940b3c6db536b52f87ea2c52ff2649f35c
SHA512f124a10ce6e52d0d0911e87f7f787e866f7006bfb7cb4972ddea9f3648e0d990e482721f0e9b517f1787184afe7acffc551c2687c4b8954f13f02c481a67f770
-
Filesize
61KB
MD5a14c845ea555b8a3192dd9ac0aa81b3f
SHA1c3250a746925188ea8f86f621bca94cddb608f15
SHA25658d76f9b7b366f904ca17137cc09107fd8e044345c8dcea8580af0ac1178b921
SHA512ea6168d6c8c7d7f15aab1aad33600996d905b2d69f6752b576eb83d06c17a368a8481bc06bd43a1b5f327bb3dc074d2d6b91ccebda1ac699bdcb46ab783209a8
-
Filesize
56KB
MD5da42fe3f930dd74503e4ad64f189a94e
SHA14769c4ba7d418401fb36a2a8b4f08a6a90e7336b
SHA256d4b300b79a3e1ef81f249ff8d21144a70ca4436bf34755be82b32e22c2bb69f2
SHA512f21d05873612d7cd158b48f83c040e368e18cb139fa201e81378e4cde49ba92ff739eabaa1ae99b5a42c65ae10ba41131f9314c2190980e2f51f4bed28ef7bc6
-
Filesize
3KB
MD527918125e3e21d466f5b38b590a050ac
SHA1ca97922d9d772442717b1b7a578e79c36e8a64e4
SHA256f41840854e40999ae80e85ea48f4399f599d026a68c6474769d75e09ffaeeb6f
SHA5120ccd1be3b69a03ac277f4b5a9f30e32867d3ab99e888a7cef30d39b29a03c75cd6382b33e14ffa90daada0755a248c398efa5d0ae315ac1af588cc48d03ad23a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_secure.aarp.org_0.indexeddb.blob\1\00\9
Filesize90KB
MD59809a8cb01d642f45b9e4abb4ef2f14b
SHA19c5d9136aed671ecf262eb048e3a74b0c7d4424c
SHA2568034179fecdf4a9c64d73040491adba104edb5b8219969706fc92948e4402c5b
SHA512a348c7e382121b3bf29ef3d6cbc066a52e1acdd11f76d345c39e528c65608d6a282a055dc4f2ca51ef1d4ff09af02fd0b5074394c74cb7e12d5039abc0719621
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_secure.aarp.org_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.aarp.org_0.indexeddb.blob\1\00\11
Filesize1.2MB
MD5df4189140d3cc2b730f33ec6f3424149
SHA13b5dbd1043165b7c3223f5e6d1cb579e2fd4d440
SHA256bfbd115d6648c813fed7fc8ef817bc81df600a00bc9ee983f80bfa8e0674c634
SHA5120fb5c50feeb51b493d50457e06471dcbc9aadf76aeab1e67f4007efef69e7f84587e092d7033d399afc5903b2279c405f7ff8f0e5e1240545f5fa29bd1ef4546
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\5b49a2e4-dffa-403f-ad0a-48a1dc1b5755.tmp
Filesize6KB
MD5675b53703d2b8e205084d5f5d52780ee
SHA1d65c3302f9eeb285ed40f5bce31d16655ac68022
SHA25605f3e249d15046228711a95e080c947dd7268afde8024f2d6a89a14b7af64f1c
SHA512da654db01b26e31ab3c9a5c95b6d808f56a996b7180cc9a90e11bbf35c1a70a5e13c8b05bac511a98f15200e3eb5beedba6296856d68b9027cdf582672bb908e
-
Filesize
14KB
MD5bd800fff57a216400fb13522f310e974
SHA1aa1e8274cada65e5f847f2e676d724a763830bb8
SHA256851cd018347b1fbc259dc740bfe0b813ed43054308ac6b4e951f82b2da06fa20
SHA512478b0c667e4a9c0f31b3a9cd814ec07acf4cb0bf5f3f1bd60731064af5d5114dd31407534e7c2c2448e87ea21185b88de9b405d06146a7785ca9cc2c92057902
-
Filesize
4KB
MD572c3705ddd82ae3a0c9accf80c2b367e
SHA12447679119e0a1a344be02ecbae0da927f8b303e
SHA2562af4964c64ff832c3b29099eed50cf300d1ea48a6aff5cef52837fc1c312cb73
SHA512aba7b29d476190305cec847f6569c6137ae318d9b2a4672caa8d2e89294b1d634a15a360c40006befa5bb805defe98cca6d01566010872473eff2fbd024b1164
-
Filesize
5KB
MD5e50c3cff27c1233352bd18d645d9be8e
SHA1ffe5b7368339ba03a178c5e2522354434132f1f0
SHA256ddaf239492ba60f4739e2af4ffc0362e2d0fd93329fb25725fd1f3242dee4d1f
SHA512d6e0dd14c67696a7629ddc68144c7f01789226db9f23e85a114fc133e6e945f5672c5ce9de43eb8a212f14194e842f8a5ac8d0be2cd4f18872b4aebdc7e1f619
-
Filesize
7KB
MD57968f6b07ddd76b25d6d03362acc8926
SHA1932f6a600a6fad781e5a1d70375b76b62237ead8
SHA2567234ffaf2391f0b3799cd40a0b7d32d4e3dda56e3d93fc8db418760ed430d85b
SHA5125ff5dc8ccf93edeb7749ab5378067ce57b7d3e98aeb769e7f8b4a34fd47e9777f7c5008b32a59cbf0407f5e5d03d9ed55433180016ebf7801aa3f1b5181122a8
-
Filesize
7KB
MD5cfd45bbffcdfe06220037dff273fc720
SHA1daff4c87fabeae6d304ff33bdb5f40e00a9c8dc4
SHA2563f2511f239b3dc2a4c21dde9542e83b7b89da4d540aab04779f705afd993e7b0
SHA5125c71e7092c0e268132aaa6d13b5d10839092a1aa51ee0e260fbe0278d685f5c3719555769756fbbdc28fd3ead06f49f122d91bce3ada2ca19b5f9e1a62c7e5b7
-
Filesize
7KB
MD539a92edab10ba8f8473d4aa5eca51088
SHA1ab636b62ca4f388bcdd62d0d90a9d97561a4dbd0
SHA25695d497aace3fcca36f7b2ac1922362f208ae8145c118b339ca9746bf331c4707
SHA512af983e5aab67fd038b56d8113ac5e3f40c297496fc41acddebc7ab6ca42acbc2e050b54401f45ddabec62930cf49a2b3c0d6c66be222f9f868b8f65f0f4586a4
-
Filesize
7KB
MD5adfb22a81181ccfa4e710a2a05d71e44
SHA13b036f5324abbdda7c87eec081e7eb94d314ad76
SHA2568471422f500e4e09e1beadce38bdc126526970ba580e615722fd7835f0d31360
SHA512fc211a98134bb635f039f0d3dec807ba3fa4abd5506f09042b499b789309dba8a69a1e4060c26fa073bf48bffaafab88b73ef187346402bda3a35b2aefa8c4bb
-
Filesize
6KB
MD531b25b4af29a59a830317a359df553c9
SHA1156f95ced6cc75ac082d98f88a107f7cbb382af0
SHA256c9f43dedf66e26cc86dfb85ca7a34d0392207217d16914e3ca3e2bc4151bef70
SHA5123ca1f6ae36abe2a63e83596826d4668df46b99fb40a0ba89e96bf8b8cc1bcb0034fec0ec0ffbe3a7fc0469c48daaeaed94da14860be49352e841778e07d4cc76
-
Filesize
6KB
MD56127d74d65119e2e4357f45e7075988d
SHA100e98633e42a5b3da539d0cef8b1c7ae4930bbb5
SHA2565db6cc35f7abd4df118ecf7937b76e811daa2fea56035e9bb4d772130ff3fb2f
SHA51238ce27f66660b6f2c29b3ef90bdd5483a93c2cf905fd44c81ed4478d8d05b773a9f0942e8abf081deb53df484642c6f82eb77577d4dc0ce2611c157dd64407d3
-
Filesize
5KB
MD53b12e51614c51c6cf5d7e3971733f3dd
SHA1f1df1790a060bc0cdc5341a3aac270ea8fa6cee9
SHA2566c5a3be2656955d3202b3ee9e77949013937c357aece9853186b439710c49e52
SHA5126f685cbabe2da398cc7dd516e9491f81706b2b0a91f377f637268fabb2c2a475e5bea446d6f5aa5b7500a52e9a31ad4855c1648143bad168c62f43b3971d6af6
-
Filesize
87KB
MD523a0d02833dfcac8bb329843b3029c5c
SHA1d9ba2847537d0d8c15689e1e04e7a241e0b2d307
SHA2566113e3dcadde58dc99cce2b7fb8477445873f3a3bcbd82b5d23e5125c5070de1
SHA512177125ec7424d9ee65cd43cb50c8823609ea3a81bff4d67778561c5df967511c154cb16a9696735647e50cbb6677abdaedda622f638e09304dc02753007cc5a2
-
Filesize
87KB
MD57ec06a5b73e5924fbc7edd2ae879e352
SHA183ea6924a18a0a451ec1fda4725be54814e99a7d
SHA256694b4a2470ff1a35d5e08e3c8dd95436f6ed9b578b4481ac0cd563762a779cf3
SHA512e46248119dc4018728437a72fce00c8972971cd7557f29d0f3c3d3a47149a028d92333db867a0f5510b827a0ea85c4c9dc0564d70f6ed1673e2dd9d54e7175ee
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd