Analysis
-
max time kernel
385s -
max time network
366s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-01-2022 04:22
Static task
static1
Behavioral task
behavioral1
Sample
Avos_18_07_2021_403KB.exe
Resource
win7-en-20211208
General
-
Target
Avos_18_07_2021_403KB.exe
-
Size
402KB
-
MD5
de6152b2b3a181509c5d71a332a75043
-
SHA1
d62c0ad2ec132065c5807c0fe7a4cabcba34cf29
-
SHA256
01792043e07a0db52664c5878b253531b293754dc6fd6a8426899c1a66ddd61f
-
SHA512
99df08f8c0d966c1ca866cc414939ee9ff23a044496497edd5c64fb83a7011718183272f9001dec97111a8e8387218632c7ef6a9f00644e01363540002f5b0d4
Malware Config
Extracted
C:\$Recycle.Bin\GET_YOUR_FILES_BACK.txt
avoslocker
http://avos2fuj6olp6x36.onion
http://avos53nnmi4u6amh.onion/
Signatures
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Downloads MZ/PE file
-
Executes dropped EXE 22 IoCs
pid Process 2420 torbrowser-install-win64-11.0.4_en-US.exe 376 Process not Found 2284 firefox.exe 1940 firefox.exe 2316 firefox.exe 2064 firefox.exe 1324 firefox.exe 2960 firefox.exe 2644 firefox.exe 2628 firefox.exe 772 firefox.exe 1084 firefox.exe 1064 firefox.exe 1456 firefox.exe 1016 firefox.exe 2876 firefox.exe 2772 firefox.exe 2460 firefox.exe 2336 firefox.exe 2840 firefox.exe 1668 firefox.exe 1932 firefox.exe -
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\InstallDisconnect.raw => C:\Users\Admin\Pictures\InstallDisconnect.raw.avos Avos_18_07_2021_403KB.exe File renamed C:\Users\Admin\Pictures\RequestDisable.tif => C:\Users\Admin\Pictures\RequestDisable.tif.avos Avos_18_07_2021_403KB.exe File renamed C:\Users\Admin\Pictures\SearchGrant.tif => C:\Users\Admin\Pictures\SearchGrant.tif.avos Avos_18_07_2021_403KB.exe File renamed C:\Users\Admin\Pictures\SendComplete.png => C:\Users\Admin\Pictures\SendComplete.png.avos Avos_18_07_2021_403KB.exe File renamed C:\Users\Admin\Pictures\ConvertFromStop.raw => C:\Users\Admin\Pictures\ConvertFromStop.raw.avos Avos_18_07_2021_403KB.exe -
Loads dropped DLL 64 IoCs
pid Process 2724 chrome.exe 2724 chrome.exe 1180 chrome.exe 2420 torbrowser-install-win64-11.0.4_en-US.exe 2420 torbrowser-install-win64-11.0.4_en-US.exe 1404 Process not Found 2680 chrome.exe 2680 chrome.exe 2420 torbrowser-install-win64-11.0.4_en-US.exe 2420 torbrowser-install-win64-11.0.4_en-US.exe 2420 torbrowser-install-win64-11.0.4_en-US.exe 2420 torbrowser-install-win64-11.0.4_en-US.exe 376 Process not Found 376 Process not Found 376 Process not Found 2420 torbrowser-install-win64-11.0.4_en-US.exe 2420 torbrowser-install-win64-11.0.4_en-US.exe 2284 firefox.exe 1940 firefox.exe 2316 firefox.exe 1940 firefox.exe 2316 firefox.exe 1940 firefox.exe 2316 firefox.exe 2316 firefox.exe 1940 firefox.exe 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 1404 Process not Found 2064 firefox.exe 1324 firefox.exe 1324 firefox.exe 1324 firefox.exe 1324 firefox.exe 2960 firefox.exe 2960 firefox.exe 2960 firefox.exe 2960 firefox.exe 2644 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 772 firefox.exe 1084 firefox.exe 1084 firefox.exe 1084 firefox.exe 1084 firefox.exe 1064 firefox.exe 1064 firefox.exe 1064 firefox.exe 1064 firefox.exe 1456 firefox.exe 1016 firefox.exe 1016 firefox.exe 1016 firefox.exe 1016 firefox.exe 2876 firefox.exe 2876 firefox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 112 NOTEPAD.EXE 1604 NOTEPAD.EXE 1932 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe 1776 Avos_18_07_2021_403KB.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 992 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 992 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 112 NOTEPAD.EXE 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 1180 chrome.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe 992 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1180 wrote to memory of 548 1180 chrome.exe 40 PID 1180 wrote to memory of 548 1180 chrome.exe 40 PID 1180 wrote to memory of 548 1180 chrome.exe 40 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 780 1180 chrome.exe 41 PID 1180 wrote to memory of 1208 1180 chrome.exe 42 PID 1180 wrote to memory of 1208 1180 chrome.exe 42 PID 1180 wrote to memory of 1208 1180 chrome.exe 42 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43 PID 1180 wrote to memory of 1536 1180 chrome.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\Avos_18_07_2021_403KB.exe"C:\Users\Admin\AppData\Local\Temp\Avos_18_07_2021_403KB.exe"1⤵
- Modifies extensions of user files
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\GET_YOUR_FILES_BACK.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1604
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\GET_YOUR_FILES_BACK.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1932
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\GET_YOUR_FILES_BACK.txt1⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:112
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a64f50,0x7fef6a64f60,0x7fef6a64f702⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1092 /prefetch:22⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1260 /prefetch:82⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1712 /prefetch:82⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2028 /prefetch:12⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2088 /prefetch:12⤵PID:612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1120 /prefetch:22⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=828 /prefetch:12⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3100 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3232 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2220 /prefetch:12⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2456 /prefetch:82⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4116 /prefetch:82⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2368 /prefetch:82⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3040 /prefetch:82⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 /prefetch:82⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4000 /prefetch:82⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3488 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2120 /prefetch:82⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3740 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3264 /prefetch:82⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3252 /prefetch:82⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3452 /prefetch:82⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4176 /prefetch:82⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4188 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4236 /prefetch:82⤵PID:876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4224 /prefetch:82⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4196 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2100 /prefetch:82⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1744 /prefetch:82⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:82⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 /prefetch:82⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4048 /prefetch:82⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3152 /prefetch:82⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3160 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3556 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3052 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3360 /prefetch:82⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4432 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4640 /prefetch:82⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4668 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3276 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3184 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2472 /prefetch:12⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3972 /prefetch:82⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=764 /prefetch:82⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1592 /prefetch:82⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 /prefetch:82⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3624 /prefetch:82⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3972 /prefetch:82⤵
- Loads dropped DLL
PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1032,10903846938737078337,5914357124061385417,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3624 /prefetch:82⤵
- Loads dropped DLL
PID:2724
-
-
C:\Users\Admin\Downloads\torbrowser-install-win64-11.0.4_en-US.exe"C:\Users\Admin\Downloads\torbrowser-install-win64-11.0.4_en-US.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2420 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1940
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2284 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:2316
-
-
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1324 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel="1324.0.764708670\404874306" -parentBuildID 20220602050101 -prefsHandle 980 -prefMapHandle 972 -prefsLen 1 -prefMapSize 239150 -appdir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - 1324 gpu3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2960
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:772 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1084
-
-
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2644 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:2628 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel="2628.0.804700907\1208409997" -parentBuildID 20220602050101 -prefsHandle 988 -prefMapHandle 980 -prefsLen 1 -prefMapSize 239150 -appdir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - 2628 gpu3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1064
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1456 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1016 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel="1016.0.332937747\1819585627" -parentBuildID 20220602050101 -prefsHandle 996 -prefMapHandle 988 -prefsLen 1 -prefMapSize 239150 -appdir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - 1016 gpu5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2876
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"5⤵
- Executes dropped EXE
PID:2772
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:992
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2460 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel="2460.0.1984617553\1928746415" -parentBuildID 20220602050101 -prefsHandle 1008 -prefMapHandle 992 -prefsLen 1 -prefMapSize 239150 -appdir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - 2460 gpu2⤵
- Executes dropped EXE
PID:2336
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"2⤵
- Executes dropped EXE
PID:2840 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1668 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel="1668.0.429994733\205469630" -parentBuildID 20220602050101 -prefsHandle 976 -prefMapHandle 968 -prefsLen 1 -prefMapSize 239150 -appdir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - 1668 gpu4⤵
- Executes dropped EXE
PID:1932
-
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt1⤵PID:1256