Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1098s -
max time network
1100s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/09/2022, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
ExLoader_Installer.exe
Resource
win10v2004-20220812-en
General
-
Target
ExLoader_Installer.exe
-
Size
9.0MB
-
MD5
ce760649f94dfca36358201a735740b3
-
SHA1
b76f4bfd7e98c7f117571021c2e3e8e935b901c8
-
SHA256
d54d4095087a0cf8a194b89593b85a7df31d4fccdabfa5f5a592643028654d87
-
SHA512
0d27d77fb2776a02cf04d1feb40394ea6f580406ee572c60b91461d0a38f3ff5d0106eb740083bfb0c100ece3189ad657a50376144607590d4990328f84025c2
-
SSDEEP
196608:IHmiehP7tSzS28SHWJkvP+eSt1NJUFP09esGAYtGAlAdXCY3rDhNG/:IGFFt4npnCt1NJASOAYtGAlAQWrDhm
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 5016 ExLoader_Installer.exe 4796 ExLoader.exe 3116 OperaSetup.exe 2644 OperaSetup.exe 4508 OperaSetup.exe 3872 OperaSetup.exe 1972 OperaSetup.exe 1884 _sfx.exe 4704 assistant_installer.exe 4084 assistant_installer.exe 2540 installer.exe 2260 installer.exe 1264 launcher.exe 4424 opera.exe 620 opera_crashreporter.exe 2160 opera.exe 3888 opera.exe 4744 opera.exe 2144 opera_crashreporter.exe 3520 opera.exe 3164 opera.exe 4100 opera.exe 4072 opera.exe 3784 opera.exe 4040 opera.exe 1392 opera.exe 1080 opera.exe 3448 opera.exe 2644 opera.exe 1884 opera.exe 3432 opera.exe 540 opera.exe 1744 opera.exe 616 opera.exe 4132 opera.exe 5128 opera.exe 5296 opera.exe 5312 opera.exe 5336 opera.exe 5368 opera.exe 5456 opera.exe 5556 opera.exe 5648 opera.exe 5676 opera_autoupdate.exe 5796 opera_autoupdate.exe 5752 opera.exe 5812 opera.exe 5896 opera.exe 5964 opera.exe 5996 opera.exe 6036 opera.exe 6080 opera.exe 224 opera.exe 1848 opera.exe 3852 opera.exe 4220 opera.exe 4764 opera.exe 2096 opera.exe 1648 opera.exe 2260 opera.exe 2108 opera.exe 5760 opera.exe 5972 opera.exe 5744 launcher.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{E7629152-0A34-4487-B787-5D1144304455}\LocalServer32\ServerExecutable = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Opera\\91.0.4516.21\\notification_helper.exe" installer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{E7629152-0A34-4487-B787-5D1144304455}\LocalServer32 installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{E7629152-0A34-4487-B787-5D1144304455}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\Opera\\91.0.4516.21\\notification_helper.exe\"" installer.exe -
resource yara_rule behavioral1/memory/3116-236-0x0000000000400000-0x0000000000922000-memory.dmp upx behavioral1/memory/4508-238-0x0000000000400000-0x0000000000922000-memory.dmp upx behavioral1/memory/2644-241-0x0000000000400000-0x0000000000922000-memory.dmp upx behavioral1/memory/3872-242-0x0000000000400000-0x0000000000922000-memory.dmp upx behavioral1/memory/1972-243-0x0000000000400000-0x0000000000922000-memory.dmp upx behavioral1/memory/3116-256-0x0000000000400000-0x0000000000922000-memory.dmp upx behavioral1/memory/2644-261-0x0000000000400000-0x0000000000922000-memory.dmp upx behavioral1/memory/3872-265-0x0000000000400000-0x0000000000922000-memory.dmp upx behavioral1/memory/1972-270-0x0000000000400000-0x0000000000922000-memory.dmp upx -
Checks computer location settings 2 TTPs 18 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation opera.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation ExLoader_Installer.exe -
Loads dropped DLL 64 IoCs
pid Process 5016 ExLoader_Installer.exe 5016 ExLoader_Installer.exe 5016 ExLoader_Installer.exe 5016 ExLoader_Installer.exe 5016 ExLoader_Installer.exe 5016 ExLoader_Installer.exe 4796 ExLoader.exe 4796 ExLoader.exe 4796 ExLoader.exe 4796 ExLoader.exe 4796 ExLoader.exe 4796 ExLoader.exe 3116 OperaSetup.exe 2644 OperaSetup.exe 4508 OperaSetup.exe 3872 OperaSetup.exe 1972 OperaSetup.exe 2540 installer.exe 2260 installer.exe 4424 opera.exe 4424 opera.exe 2160 opera.exe 2160 opera.exe 3888 opera.exe 3888 opera.exe 2160 opera.exe 2160 opera.exe 2160 opera.exe 2160 opera.exe 2160 opera.exe 4744 opera.exe 4744 opera.exe 3520 opera.exe 3520 opera.exe 3164 opera.exe 3520 opera.exe 3520 opera.exe 3520 opera.exe 3520 opera.exe 3520 opera.exe 3164 opera.exe 4100 opera.exe 4100 opera.exe 4072 opera.exe 4072 opera.exe 3784 opera.exe 3784 opera.exe 4040 opera.exe 4040 opera.exe 1392 opera.exe 1392 opera.exe 1080 opera.exe 1080 opera.exe 3448 opera.exe 3448 opera.exe 2644 opera.exe 2644 opera.exe 1884 opera.exe 1884 opera.exe 3432 opera.exe 3432 opera.exe 540 opera.exe 540 opera.exe 1744 opera.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{49e969a1-2990-464d-92b5-25f6f34573c6} = "\"C:\\ProgramData\\Package Cache\\{49e969a1-2990-464d-92b5-25f6f34573c6}\\vcredist_x64.exe\" /burn.runonce" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{61087a79-ac85-455c-934d-1fa22cc64f36} = "\"C:\\ProgramData\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\vcredist_x86.exe\" /burn.runonce" vcredist_x86_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6} = "\"C:\\ProgramData\\Package Cache\\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\\vcredist_x64.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_amd64_20220924140902.log\" /uninstall /quiet ignored /burn.runonce" vcredist_x64_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{2af972c7-13b0-4978-92a8-fee26a4fb4e9} = "\"C:\\ProgramData\\Package Cache\\{2af972c7-13b0-4978-92a8-fee26a4fb4e9}\\vcredist_x86.exe\" /quiet /norestart /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_x86_20220924141021.log\" /burn.runonce" vcredist_x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{ce085a78-074e-4823-8dc1-8a721b94b76d} = "\"C:\\ProgramData\\Package Cache\\{ce085a78-074e-4823-8dc1-8a721b94b76d}\\vcredist_x86.exe\" /quiet /norestart /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_x86_20220924141022.log\" /burn.runonce" vcredist_x86_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{8e70e4e1-06d7-470b-9f74-a51bef21088e} = "\"C:\\ProgramData\\Package Cache\\{8e70e4e1-06d7-470b-9f74-a51bef21088e}\\vcredist_x86.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_x86_20220924140433.log\" /quiet /norestart ignored /burn.runonce" vcredist_x86_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{7f51bdb9-ee21-49ee-94d6-90afc321780e} = "\"C:\\ProgramData\\Package Cache\\{7f51bdb9-ee21-49ee-94d6-90afc321780e}\\vcredist_x64.exe\" /quiet /norestart /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_amd64_20220924141020.log\" /burn.runonce" vcredist_x64_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{a2199617-3609-410f-a8e8-e8806c73545b} = "\"C:\\ProgramData\\Package Cache\\{a2199617-3609-410f-a8e8-e8806c73545b}\\vcredist_x64.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_amd64_20220924140901.log\" /uninstall /quiet ignored /burn.runonce" vcredist_x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{a2199617-3609-410f-a8e8-e8806c73545b} = "\"C:\\ProgramData\\Package Cache\\{a2199617-3609-410f-a8e8-e8806c73545b}\\vcredist_x64.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_amd64_20220924140932.log\" /quiet /norestart ignored /burn.runonce" vcredist_x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{ef6b00ec-13e1-4c25-9064-b2f383cb8412} = "\"C:\\ProgramData\\Package Cache\\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\\vcredist_x64.exe\" /burn.runonce" vcredist_x64_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece} = "\"C:\\ProgramData\\Package Cache\\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece}\\vcredist_x86.exe\" /burn.runonce" vcredist_x86_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{dde2682b-961a-41ea-8d44-6005991b7947} = "\"C:\\ProgramData\\Package Cache\\{dde2682b-961a-41ea-8d44-6005991b7947}\\vcredist_x64.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_amd64_20220924140934.log\" /quiet /norestart ignored /burn.runonce" vcredist_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{01db25f3-1b76-4d97-88c8-1c90634d88fb} = "\"C:\\ProgramData\\Package Cache\\{01db25f3-1b76-4d97-88c8-1c90634d88fb}\\vcredist_x86.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_x86_20220924140430.log\" /quiet /norestart ignored /burn.runonce" vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{95716cce-fc71-413f-8ad5-56c2892d4b3a} = "\"C:\\ProgramData\\Package Cache\\{95716cce-fc71-413f-8ad5-56c2892d4b3a}\\vcredist_x86.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_x86_20220924140431.log\" /quiet /norestart ignored /burn.runonce" vcredist_x86_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{ef6b00ec-13e1-4c25-9064-b2f383cb8412} = "\"C:\\ProgramData\\Package Cache\\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\\vcredist_x64.exe\" /burn.runonce" vcredist_x64_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f} = "\"C:\\ProgramData\\Package Cache\\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\\vcredist_x86.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_x86_20220924140402.log\" /uninstall /quiet ignored /burn.runonce" vcredist_x86_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{f0080ca2-80ae-4958-b6eb-e8fa916d744a} = "\"C:\\ProgramData\\Package Cache\\{f0080ca2-80ae-4958-b6eb-e8fa916d744a}\\vcredist_x86.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_x86_20220924140428.log\" /quiet /norestart ignored /burn.runonce" vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{15134cb0-b767-4960-a911-f2d16ae54797} = "\"C:\\ProgramData\\Package Cache\\{15134cb0-b767-4960-a911-f2d16ae54797}\\vcredist_x64.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_amd64_20220924140939.log\" /quiet /norestart ignored /burn.runonce" vcredist_x64_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{10dc8dbf-d3d7-4e23-be07-120fe5c66b78} = "\"C:\\ProgramData\\Package Cache\\{10dc8dbf-d3d7-4e23-be07-120fe5c66b78}\\vcredist_x86.exe\" /burn.runonce" vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{61087a79-ac85-455c-934d-1fa22cc64f36} = "\"C:\\ProgramData\\Package Cache\\{61087a79-ac85-455c-934d-1fa22cc64f36}\\vcredist_x86.exe\" /burn.runonce" vcredist_x86_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{0513c9cf-7191-45a7-ace9-ecdad03c93a4} = "\"C:\\ProgramData\\Package Cache\\{0513c9cf-7191-45a7-ace9-ecdad03c93a4}\\vcredist_x64.exe\" /burn.runonce" vcredist_x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{050d4fc8-5d48-4b8f-8972-47c82c46020f} = "\"C:\\ProgramData\\Package Cache\\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\\vcredist_x64.exe\" /burn.runonce" vcredist_x64_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{6c95b50e-cb5a-4a1f-a7b4-8a6004f8dd6a} = "\"C:\\ProgramData\\Package Cache\\{6c95b50e-cb5a-4a1f-a7b4-8a6004f8dd6a}\\vcredist_x86.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_x86_20220924140434.log\" /quiet /norestart ignored /burn.runonce" vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{a1909659-0a08-4554-8af1-2175904903a1} = "\"C:\\ProgramData\\Package Cache\\{a1909659-0a08-4554-8af1-2175904903a1}\\vcredist_x64.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_amd64_20220924140935.log\" /quiet /norestart ignored /burn.runonce" vcredist_x64_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{c6870a89-ef30-4f22-bbd1-49cd2516bc56} = "\"C:\\ProgramData\\Package Cache\\{c6870a89-ef30-4f22-bbd1-49cd2516bc56}\\vcredist_x64.exe\" /burn.runonce" vcredist_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{f0080ca2-80ae-4958-b6eb-e8fa916d744a} = "\"C:\\ProgramData\\Package Cache\\{f0080ca2-80ae-4958-b6eb-e8fa916d744a}\\vcredist_x86.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_x86_20220924140401.log\" /uninstall /quiet ignored /burn.runonce" vcredist_x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x86_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{22154f09-719a-4619-bb71-5b3356999fbf} = "\"C:\\ProgramData\\Package Cache\\{22154f09-719a-4619-bb71-5b3356999fbf}\\vcredist_x86.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_x86_20220924140435.log\" /quiet /norestart ignored /burn.runonce" vcredist_x86_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{10dc8dbf-d3d7-4e23-be07-120fe5c66b78} = "\"C:\\ProgramData\\Package Cache\\{10dc8dbf-d3d7-4e23-be07-120fe5c66b78}\\vcredist_x86.exe\" /burn.runonce" vcredist_x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{6e8f74e0-43bd-4dce-8477-6ff6828acc07} = "\"C:\\ProgramData\\Package Cache\\{6e8f74e0-43bd-4dce-8477-6ff6828acc07}\\vcredist_x64.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_amd64_20220924140937.log\" /quiet /norestart ignored /burn.runonce" vcredist_x64_eng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{0f12c81f-93ef-46ec-bc94-d952c1a775d4} = "\"C:\\ProgramData\\Package Cache\\{0f12c81f-93ef-46ec-bc94-d952c1a775d4}\\vcredist_x64.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_amd64_20220924140938.log\" /quiet /norestart ignored /burn.runonce" vcredist_x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vcredist_x64_eng.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\Windows\system32\mfc100u.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc110deu.dll msiexec.exe File created C:\Windows\SysWOW64\msvcr120.dll msiexec.exe File opened for modification C:\Windows\system32\mfc110cht.dll msiexec.exe File created C:\Windows\system32\vccorlib120.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100rus.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfcm110.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcp110.dll msiexec.exe File created C:\Windows\SysWOW64\mfcm110.dll msiexec.exe File created C:\Windows\system32\mfc110fra.dll msiexec.exe File created C:\Windows\system32\mfc120esn.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100fra.dll msiexec.exe File created C:\Windows\SysWOW64\msvcr100.dll msiexec.exe File created C:\Windows\SysWOW64\mfc110fra.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120esn.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120kor.dll msiexec.exe File created C:\Windows\system32\vcomp120.dll msiexec.exe File created C:\Windows\SysWOW64\mfc110deu.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcr100.dll msiexec.exe File created C:\Windows\SysWOW64\mfc100esn.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120enu.dll msiexec.exe File opened for modification C:\Windows\system32\mfc110ita.dll msiexec.exe File created C:\Windows\system32\msvcr110.dll msiexec.exe File opened for modification C:\Windows\system32\vcamp120.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120cht.dll msiexec.exe File created C:\Windows\system32\mfcm120u.dll msiexec.exe File created C:\Windows\SysWOW64\mfc100u.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\vcomp110.dll msiexec.exe File created C:\Windows\SysWOW64\mfc110rus.dll msiexec.exe File created C:\Windows\system32\mfc100.dll msiexec.exe File opened for modification C:\Windows\system32\mfc110enu.dll msiexec.exe File opened for modification C:\Windows\system32\vccorlib110.dll msiexec.exe File created C:\Windows\SysWOW64\mfc100chs.dll msiexec.exe File created C:\Windows\SysWOW64\mfc120cht.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100kor.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100kor.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfcm120.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120fra.dll msiexec.exe File created C:\Windows\system32\mfc100enu.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120ita.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100enu.dll msiexec.exe File created C:\Windows\SysWOW64\atl100.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfcm110u.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc110rus.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc120.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100cht.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc110chs.dll msiexec.exe File created C:\Windows\system32\mfcm100u.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp110.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\atl110.dll msiexec.exe File created C:\Windows\SysWOW64\mfc110enu.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\vcamp120.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfcm100u.dll msiexec.exe File created C:\Windows\system32\vcomp110.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\vcamp110.dll msiexec.exe File created C:\Windows\system32\mfc100chs.dll msiexec.exe File created C:\Windows\system32\mfc120jpn.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100enu.dll msiexec.exe File opened for modification C:\Windows\system32\msvcr110.dll msiexec.exe File opened for modification C:\Windows\system32\mfc120jpn.dll msiexec.exe File created C:\Windows\system32\mfc120cht.dll msiexec.exe File created C:\Windows\SysWOW64\mfcm100.dll msiexec.exe File created C:\Windows\system32\mfc100jpn.dll msiexec.exe File created C:\Windows\system32\msvcp100.dll msiexec.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\ExLoader\data\flutter_assets\AssetManifest.json ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\bell_outlined.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\eye.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\plus.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\images\reloading.png ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\games\-2.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\new_year_star_filled.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\stats.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\images\grain.png ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\stars.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\ranks_competitive\Silver%20Elite%20Master.png ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_mag7.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\fonts\Rounded_Elegance.ttf ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\issue.svg ExLoader_Installer.exe File created C:\Program Files\Common Files\Microsoft Shared\VC\msdia100.dll msiexec.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\other_items\molotov_t.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\games\-1.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\games\-7.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\games\578080.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\sun_outlined.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\info.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\minimize.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\star.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\ranks_competitive\Gold%20Nova%20Master.png ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\ranks_competitive\Legendary%20Eagle%20Master.png ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\backgrounds\Halloween.png ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\geo.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\ghost_filled.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\shaders\ink_sparkle.frag ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\ranks_competitive\Gold%20Nova%20I.png ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\ranks_competitive\Silver%20IV.png ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\FontManifest.json ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\backgrounds\Underwater.png ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\users.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\images\scoped.png ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\fonts\MONTSERRAT-SEMIBOLD.TTF ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\google_logo.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\alphabetical-order.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\fun_filled.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\ranks_competitive\Distinguished%20Master%20Guardian.png ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_knife_butterfly.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\cross.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\dot.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\fun_outlined.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_xm1014.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\ExLoader.exe ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\user.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_knife_gypsy_jackknife.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_revolver.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_tec9.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\new_year_star_outlined.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\images\hackberry_gears.png ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_ak47.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_ssg08.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_usp_silencer.svg ExLoader_Installer.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia90.dll msiexec.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VC\amd64\msdia80.dll msiexec.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\images\flashed.png ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_g3sg1.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_knife_push.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_ump45.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\icons\calendar.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_negev.svg ExLoader_Installer.exe File opened for modification C:\Program Files\ExLoader\data\flutter_assets\resources\skin_items\weapon_scar20.svg ExLoader_Installer.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\InstallTemp\20220924140247091.0\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_6a5bb789.manifest msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140247091.0\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_6a5bb789.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140324451.0\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03.cat msiexec.exe File created C:\Windows\Installer\e5b1a17.msi msiexec.exe File created C:\Windows\Installer\e5b1965.msi msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_atl100_x86 msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20220924140601210.0 msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20220924140825922.0 msiexec.exe File created C:\Windows\Installer\e5b1a74.msi msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20220924140844471.0 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140116973.0\mfc80ESP.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140116973.0\mfc80JPN.dll msiexec.exe File created C:\Windows\Installer\e5b19ad.msi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140753672.0\mfc80ESP.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140753672.0\mfc80ENU.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140753936.0\amd64_Microsoft.VC80.OpenMP_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_7735df00.manifest msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140826022.0\9.0.30729.1.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140844569.0\9.0.30729.6161.policy msiexec.exe File created C:\Windows\Installer\e5b1ad9.msi msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\b25099274a207264182f8181add555d0\8.0.56336\ul_mfc80ITA.dll.74FD3CE6_2A8D_0E9C_FF1F_C8B3B9A1E18E msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\84b9c17023c712640acaf308593282f8\8.0.56336\ul_mfc80ITA.dll.608113E0_F3B6_C6EE_FF1F_C8B3B9A1E18E msiexec.exe File opened for modification C:\Windows\Installer\MSICEA7.tmp msiexec.exe File created C:\Windows\Installer\e5b1b14.msi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140116599.0\msvcp80.dll msiexec.exe File created C:\Windows\Installer\e5b196e.msi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140341994.0\mfc90esn.dll msiexec.exe File opened for modification C:\Windows\Installer\e5b1a00.msi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140600895.0\mfc80ITA.dll msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20220924140844481.0 msiexec.exe File created C:\Windows\Installer\e5b1b05.msi msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\b25099274a207264182f8181add555d0\8.0.56336\ul_mfc80KOR.dll.74FD3CE6_2A8D_0E9C_FF1F_C8B3B9A1E18E msiexec.exe File opened for modification \??\c:\Windows\Installer\3f25.msp msiexec.exe File opened for modification C:\Windows\Installer\MSID1E7.tmp msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140753672.0\amd64_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_9c659d69.manifest msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140753972.0\8.0.50727.6195.policy msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140825812.0\amd64_Microsoft.VC90.ATL_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_021e6992.manifest msiexec.exe File opened for modification C:\Windows\Installer\e5b1946.msi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140600563.0\msvcm80.dll msiexec.exe File created C:\Windows\Installer\e5b1a60.msi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140117327.0\8.0.50727.762.cat msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20220924140324442.0 msiexec.exe File created C:\Windows\Installer\e5b1979.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2B27.tmp msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140341978.0\mfc90.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140844471.0\mfc90cht.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140247299.0\x86_Microsoft.VC80.OpenMP_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_452bf920.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140324451.0\mfc90kor.dll msiexec.exe File created C:\Windows\Installer\SourceHash{FDB30193-FDA0-3DAA-ACCA-A75EEFE53607} msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140825812.0\atl90.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140116804.0\x86_Microsoft.VC80.MFC_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_3bf8fa05.cat msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\b25099274a207264182f8181add555d0\8.0.56336\ul_msvcm80.dll.98CB24AD_52FB_DB5F_FF1F_C8B3B9A1E18E msiexec.exe File created C:\Windows\Installer\e5b1ad2.msi msiexec.exe File created C:\Windows\Installer\SourceHash{86CE85E6-DBAC-3FFD-B977-E4B79F83C909} msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\84b9c17023c712640acaf308593282f8\8.0.56336\ul_mfc80.dll.8731EA9C_B0D8_8F16_FF1F_C8B3B9A1E18E msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\84b9c17023c712640acaf308593282f8\8.0.56336\FL_msdia71_dll_2_____A64.3643236F_FC70_11D3_A536_0090278A1BB8 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140844471.0\mfc90chs.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140844471.0\mfc90esn.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140324442.0\mfc90u.dll msiexec.exe File created C:\Windows\Installer\SourceHash{3D6AD258-61EA-35F5-812C-B7A02152996E} msiexec.exe File created C:\Windows\Installer\e5b1a03.msi msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20220924140826078.0 msiexec.exe File created C:\Windows\Installer\SourceHash{5AF4E09F-5C9B-3AAF-B731-544D3DC821DD} msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20220924140116973.0\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_91481303.manifest msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20220924140117262.0 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 18 IoCs
pid Process 972 tasklist.exe 4052 tasklist.exe 5228 tasklist.exe 4464 tasklist.exe 1880 tasklist.exe 364 tasklist.exe 804 tasklist.exe 5220 tasklist.exe 1436 tasklist.exe 2728 tasklist.exe 2260 tasklist.exe 3384 tasklist.exe 1044 tasklist.exe 4632 tasklist.exe 5836 tasklist.exe 2848 tasklist.exe 2740 tasklist.exe 1740 tasklist.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS opera.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName opera.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS opera.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName opera.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer opera.exe -
Kills process with taskkill 3 IoCs
pid Process 5656 taskkill.exe 5964 taskkill.exe 2456 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\62 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\6a msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\42 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\45 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\65 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\69 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\48 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\4B\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\43 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\4b msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\51 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\55 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\6e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\39 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\40 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\41 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\6E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\4E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\53 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\5A msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\60 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2D msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\3A msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\4A msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\3d msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\4C msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\58 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\5F msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\24 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2B msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\3F msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\4D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\61 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\67 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\68 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1E\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2f msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\31 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\3f msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\4e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\62 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\75 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1F\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\31 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\49 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\59 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\68 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\69 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\6B msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\32 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\43 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\49 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\53 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\5D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\20 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\46 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\47 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\40 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\56 msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimum_x86,v11 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC90.MFC,version="9.0.21022.8",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="amd64",type="win32" = 6b003300700078006b0065007e007d007400370057002500760047004f003200690057005f007800460054005f00560043005f005200650064006900730074005f004d00460043005f007800360034003e0060002e00490063006800320063006200470038006d007500270026005a0041006e007e006a00310000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67D6ECF5CD5FBA732B8B22BAC8DE1B4D\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{E7629152-0A34-4487-B787-5D1144304455}\LocalServer32\ServerExecutable = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Opera\\91.0.4516.21\\notification_helper.exe" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3e43b73803c7c394f8a6b2f0402e19c2\SourceList\Media\4 = ";Microsoft Visual C++ 2005 Redistributable [Disk 1]" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24B64BCDF327E0531BA844B96C2C6163\Assignment = "1" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12\ = "{A8589745-51BC-3963-B4E9-201CF8693538}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12\DisplayName = "Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.40664" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A3878338869058B3FA7CABEAA036CD05\AuthorizedLUAApp = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{78142960-066b-4581-b984-0bdcf560c4be}\DisplayName = "Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.40649" vcredist_x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\FB4B305EBB7FF5D3B88C6F491BFC9F24\FT_VC_Redist_MFC_x86 = "VC_Redist_12222_x86_enu" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\6E58EC68CABDDFF39B774E7BF9389C90\VC_Redist_12222_x86_enu msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v11 vcredist_x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8802AFF4713841B339DCC496D93B8734\SourceList\PackageName = "vc_red.msi" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\167F57B58CABCB333A1864D4DD8D313A msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7C9F8B73BF303523781852719CD9C700 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4396FC35D89A48D31964CFE4FDD36514\PackageCode = "1553588F03D4A6D43BA639FEDAE4EE30" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\FB4B305EBB7FF5D3B88C6F491BFC9F24\Servicing_Key msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D169104D02A37CA349B316935DDB94A0 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\Dependents vcredist_x64_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F942F94A19C0F79468FD2B85E5E8677B\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\0D756077321A70C3E844C138CE981581\SourceList\Net msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.9.0.Microsoft.VC90.MFC,version="9.0.21022.218",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86",type="win32-policy" = 2b0075004b005b00720079007a006300660037005e00340055007300570037007b00640054003900460054005f00560043005f005200650064006900730074005f004d00460043005f007800380036003e0067007400470056006b00300025005b003f003600620054002e0049004600300041005f0046007a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4ccf9caae9dddda409c15b94a670bae2\PackageCode = "0B49D121ACDC54B42A0D3EB281CDFB19" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\SourceList\Media\6 = ";Microsoft Visual C++ 2005 Redistributable (x64) [Disk 1]" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\CE6380BC270BD863282B3D74B09F7570\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AB297010A1550CA37AFEF0BA14653C28\SourceList\Net msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.9.0.Microsoft.VC90.CRT,version="9.0.30729.1",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86",type="win32-policy" = 35002e0046005300420053004c0041006b003700290043004c0061006100300026007a0028005b00460054005f00560043005f005200650064006900730074005f004300520054005f007800380036003e006b0027005600490037006f00520050007e00370055003d006f0029006d00730026002c003300420000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\699277C63FFBC8C368B03B4DF80FD556\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\699277C63FFBC8C368B03B4DF80FD556\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VCRedist\\VCRedist_2012_x86_False\\11.0.51106.1\\vcRuntimeAdditional_x86\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{d2c8df0e-f15d-4426-9e51-f13f329f9cb4}\Dependents\{d2c8df0e-f15d-4426-9e51-f13f329f9cb4} vcredist_x86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8E58E8E6B4EC5FF4197F4099C9F9EAA6\Version = "134268455" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\D6801C02348C1B636B879900981DDB44\Servicing_Key msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12 vcredist_x86_eng.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.9.0.Microsoft.VC90.CRT,version="9.0.30729.4048",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86",type="win32-policy" = 64003d004500400045002d0031007e00560038004400210038003100700031004b00390076003600460054005f00560043005f005200650064006900730074005f004300520054005f007800380036003e004200360062006d0043005f004c007b0037003800470026003d004a0069005a00440055005d004e0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C18E428E4A08FFD35B9F84249AFFF5F7 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\91F5141922C490631A5029DE53228DC3\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B8CF35CA81EEC9F3B9950639D7B081C2\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VCRedist\\VCRedist_2012_x64_False_v\\11.0.50727.1\\vcRuntimeAdditional_amd64\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\B696D3C37BD0D6C33A65D38BEC459181\FT_VC_Redist_MFC_x86 = "VC_Redist_12222_x86_enu" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\438E4D7EBE39F1538BBF28DCEA260330 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\12B8D03ED28D112328CCF0A0D541598E\SourceList\Net msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.8.0.Microsoft.VC80.MFCLOC,type="win32-policy",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="amd64" = 2c006c0076006a0060006f002c0042002d00400050002e0059002e00430039007300560073003000560043005f005200650064006900730074003e00500054005d002700660025002b0027004b002800650038004d006b0062004900640046007700550000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F942F94A19C0F79468FD2B85E5E8677B\Language = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\b25099274a207264182f8181add555d0\VC_Redist msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\39103BDF0ADFAAD3CAAC7AE5FE5E6370 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.9.0.Microsoft.VC90.MFCLOC,version="9.0.30729.1",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="amd64",type="win32-policy" = 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 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditional_amd64,v11\Dependents\{15134cb0-b767-4960-a911-f2d16ae54797} vcredist_x64_eng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12\Dependents\{050d4fc8-5d48-4b8f-8972-47c82c46020f} vcredist_x64_eng.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8520DAD7C5154DD39846DB1714990E7F\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8520DAD7C5154DD39846DB1714990E7F\SourceList\Media msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B7573E6B77E5519368A6CCCFB4D891C4\Version = "134268455" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\4ccf9caae9dddda409c15b94a670bae2\VC_Redist msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1D95640DD2BE5ED38A3338A726C3CC7F\FT_VC_Redist_MFCLOC_x64 = "VC_Redist_12222_amd64_rus" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1D95640DD2BE5ED38A3338A726C3CC7F\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VCRedist\\VCRedist_2008_x64_False\\9.0.21022.8.0\\" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.9.0.Microsoft.VC90.MFC,version="9.0.30729.1",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="amd64",type="win32-policy" = 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 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\91F5141922C490631A5029DE53228DC3\VC_Redist_12222_amd64_enu msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\91F5141922C490631A5029DE53228DC3\SourceList\Media\1 = ";1" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\e611ef0aa8a9f664ea0e26c57b2c703e\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditional_x86,v11\ = "{FDB30193-FDA0-3DAA-ACCA-A75EEFE53607}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12\ = "{7DAD0258-515C-3DD4-8964-BD714199E0F7}" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A7C639EE04AE5D13B956E8E380C98382\Clients = 3a0000000000 msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 OperaSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 OperaSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 OperaSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 opera.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 OperaSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 opera.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 opera.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 OperaSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 OperaSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 OperaSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A opera.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 OperaSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 OperaSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 OperaSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 opera.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3504 powershell.exe 3504 powershell.exe 3504 powershell.exe 3892 powershell.exe 3892 powershell.exe 4744 opera.exe 4744 opera.exe 704 powershell.exe 704 powershell.exe 5884 powershell.exe 5884 powershell.exe 4056 powershell.exe 4056 powershell.exe 5136 powershell.exe 5136 powershell.exe 540 powershell.exe 540 powershell.exe 4976 powershell.exe 4976 powershell.exe 2280 powershell.exe 2280 powershell.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe 388 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3504 powershell.exe Token: SeDebugPrivilege 1436 tasklist.exe Token: SeDebugPrivilege 3892 powershell.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeShutdownPrivilege 4744 opera.exe Token: SeCreatePagefilePrivilege 4744 opera.exe Token: SeDebugPrivilege 704 powershell.exe Token: SeDebugPrivilege 5836 tasklist.exe Token: SeDebugPrivilege 5884 powershell.exe Token: SeDebugPrivilege 2848 tasklist.exe Token: SeDebugPrivilege 4056 powershell.exe Token: SeDebugPrivilege 4464 tasklist.exe Token: SeDebugPrivilege 5136 powershell.exe Token: SeDebugPrivilege 1880 tasklist.exe Token: SeDebugPrivilege 540 powershell.exe Token: SeDebugPrivilege 2740 tasklist.exe Token: SeDebugPrivilege 4976 powershell.exe Token: SeDebugPrivilege 2728 tasklist.exe Token: SeDebugPrivilege 5964 taskkill.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 2260 tasklist.exe Token: SeShutdownPrivilege 6124 msiexec.exe Token: SeIncreaseQuotaPrivilege 6124 msiexec.exe Token: SeSecurityPrivilege 388 msiexec.exe Token: SeCreateTokenPrivilege 6124 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 6124 msiexec.exe Token: SeLockMemoryPrivilege 6124 msiexec.exe Token: SeIncreaseQuotaPrivilege 6124 msiexec.exe Token: SeMachineAccountPrivilege 6124 msiexec.exe Token: SeTcbPrivilege 6124 msiexec.exe Token: SeSecurityPrivilege 6124 msiexec.exe Token: SeTakeOwnershipPrivilege 6124 msiexec.exe Token: SeLoadDriverPrivilege 6124 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2540 installer.exe 4744 opera.exe -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 5016 ExLoader_Installer.exe 4796 ExLoader.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe 2540 installer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 5016 4808 ExLoader_Installer.exe 81 PID 4808 wrote to memory of 5016 4808 ExLoader_Installer.exe 81 PID 5016 wrote to memory of 448 5016 ExLoader_Installer.exe 94 PID 5016 wrote to memory of 448 5016 ExLoader_Installer.exe 94 PID 448 wrote to memory of 2264 448 cmd.exe 96 PID 448 wrote to memory of 2264 448 cmd.exe 96 PID 5016 wrote to memory of 2432 5016 ExLoader_Installer.exe 97 PID 5016 wrote to memory of 2432 5016 ExLoader_Installer.exe 97 PID 2432 wrote to memory of 4480 2432 cmd.exe 99 PID 2432 wrote to memory of 4480 2432 cmd.exe 99 PID 5016 wrote to memory of 3056 5016 ExLoader_Installer.exe 100 PID 5016 wrote to memory of 3056 5016 ExLoader_Installer.exe 100 PID 3056 wrote to memory of 3420 3056 cmd.exe 102 PID 3056 wrote to memory of 3420 3056 cmd.exe 102 PID 5016 wrote to memory of 4740 5016 ExLoader_Installer.exe 103 PID 5016 wrote to memory of 4740 5016 ExLoader_Installer.exe 103 PID 4740 wrote to memory of 3132 4740 cmd.exe 105 PID 4740 wrote to memory of 3132 4740 cmd.exe 105 PID 5016 wrote to memory of 3504 5016 ExLoader_Installer.exe 106 PID 5016 wrote to memory of 3504 5016 ExLoader_Installer.exe 106 PID 3504 wrote to memory of 1436 3504 powershell.exe 108 PID 3504 wrote to memory of 1436 3504 powershell.exe 108 PID 5016 wrote to memory of 2376 5016 ExLoader_Installer.exe 109 PID 5016 wrote to memory of 2376 5016 ExLoader_Installer.exe 109 PID 2376 wrote to memory of 2124 2376 cmd.exe 111 PID 2376 wrote to memory of 2124 2376 cmd.exe 111 PID 5016 wrote to memory of 3892 5016 ExLoader_Installer.exe 112 PID 5016 wrote to memory of 3892 5016 ExLoader_Installer.exe 112 PID 5016 wrote to memory of 4796 5016 ExLoader_Installer.exe 115 PID 5016 wrote to memory of 4796 5016 ExLoader_Installer.exe 115 PID 5016 wrote to memory of 4744 5016 ExLoader_Installer.exe 116 PID 5016 wrote to memory of 4744 5016 ExLoader_Installer.exe 116 PID 4744 wrote to memory of 4764 4744 cmd.exe 117 PID 4744 wrote to memory of 4764 4744 cmd.exe 117 PID 5016 wrote to memory of 4760 5016 ExLoader_Installer.exe 118 PID 5016 wrote to memory of 4760 5016 ExLoader_Installer.exe 118 PID 4760 wrote to memory of 2132 4760 cmd.exe 123 PID 4760 wrote to memory of 2132 4760 cmd.exe 123 PID 4796 wrote to memory of 3052 4796 ExLoader.exe 126 PID 4796 wrote to memory of 3052 4796 ExLoader.exe 126 PID 3052 wrote to memory of 4192 3052 cmd.exe 125 PID 3052 wrote to memory of 4192 3052 cmd.exe 125 PID 4796 wrote to memory of 1000 4796 ExLoader.exe 128 PID 4796 wrote to memory of 1000 4796 ExLoader.exe 128 PID 1000 wrote to memory of 3700 1000 cmd.exe 129 PID 1000 wrote to memory of 3700 1000 cmd.exe 129 PID 5016 wrote to memory of 3116 5016 ExLoader_Installer.exe 130 PID 5016 wrote to memory of 3116 5016 ExLoader_Installer.exe 130 PID 5016 wrote to memory of 3116 5016 ExLoader_Installer.exe 130 PID 3116 wrote to memory of 2644 3116 OperaSetup.exe 131 PID 3116 wrote to memory of 2644 3116 OperaSetup.exe 131 PID 3116 wrote to memory of 2644 3116 OperaSetup.exe 131 PID 3116 wrote to memory of 4508 3116 OperaSetup.exe 132 PID 3116 wrote to memory of 4508 3116 OperaSetup.exe 132 PID 3116 wrote to memory of 4508 3116 OperaSetup.exe 132 PID 3116 wrote to memory of 3872 3116 OperaSetup.exe 133 PID 3116 wrote to memory of 3872 3116 OperaSetup.exe 133 PID 3116 wrote to memory of 3872 3116 OperaSetup.exe 133 PID 3872 wrote to memory of 1972 3872 OperaSetup.exe 134 PID 3872 wrote to memory of 1972 3872 OperaSetup.exe 134 PID 3872 wrote to memory of 1972 3872 OperaSetup.exe 134 PID 3116 wrote to memory of 1884 3116 OperaSetup.exe 136 PID 3116 wrote to memory of 1884 3116 OperaSetup.exe 136 PID 3116 wrote to memory of 1884 3116 OperaSetup.exe 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExLoader_Installer.exe"C:\Users\Admin\AppData\Local\Temp\ExLoader_Installer.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ExLoader_Installer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ExLoader_Installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe query HKEY_CURRENT_USER\Software\Yandex\YandexBrowser /v last_startup_time3⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CURRENT_USER\Software\Yandex\YandexBrowser /v last_startup_time4⤵PID:2264
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe query "HKEY_CURRENT_USER\Software\Opera Software" /v "Last Stable Install Path"3⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query "HKEY_CURRENT_USER\Software\Opera Software" /v "Last Stable Install Path"4⤵PID:4480
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Opera Software" /v "Last Stable Install Path"3⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Opera Software" /v "Last Stable Install Path"4⤵PID:3420
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Opera Software" /v "Last Stable Install Path"3⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Opera Software" /v "Last Stable Install Path"4⤵PID:3132
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "exloader.exe\"" /FO CSV3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq exloader.exe" /FO CSV4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware3⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware4⤵PID:2124
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command "$WshShell = New-Object -comObject WScript.Shell $Shortcut = $WshShell.CreateShortcut(\"C:\Users\Admin\Desktop\ExLoader.lnk\") $Shortcut.TargetPath = \"C:\Program Files\ExLoader\ExLoader.exe\" $Shortcut.Save()"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-
C:\Program Files\ExLoader\ExLoader.exe"C:\Program Files\ExLoader\ExLoader.exe" -deletePreviousExLoader3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography /v MachineGuid4⤵
- Suspicious use of WriteProcessMemory
PID:3052
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid4⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid5⤵PID:3700
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath4⤵PID:4040
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath5⤵PID:2260
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath4⤵PID:808
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath5⤵PID:5336
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath4⤵PID:3976
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath5⤵PID:5172
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString4⤵PID:5100
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵PID:6044
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString4⤵PID:6028
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵PID:1976
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "steam.exe\"" /FO CSV4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:704 -
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq steam.exe" /FO CSV5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5836
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath4⤵PID:5640
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath5⤵PID:5536
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath4⤵PID:5564
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath5⤵PID:5416
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath4⤵PID:5440
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath5⤵PID:5252
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString4⤵PID:5264
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵PID:2104
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString4⤵PID:1972
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵PID:5856
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "steam.exe\"" /FO CSV4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5884 -
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq steam.exe" /FO CSV5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath4⤵PID:916
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath5⤵PID:3888
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath4⤵PID:2224
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath5⤵PID:724
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath4⤵PID:4668
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath5⤵PID:5300
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString4⤵PID:5348
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵PID:2772
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString4⤵PID:3660
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵PID:4540
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "steam.exe\"" /FO CSV4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056 -
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq steam.exe" /FO CSV5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "csgo.exe\"" /FO CSV4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5136 -
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq csgo.exe" /FO CSV5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "faceitclient.exe\"" /FO CSV4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:540 -
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq faceitclient.exe" /FO CSV5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "faceitservice.exe\"" /FO CSV4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4976 -
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq faceitservice.exe" /FO CSV5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 0D756077321A70C3E844C138CE9815814⤵PID:4308
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 0D756077321A70C3E844C138CE9815815⤵PID:2052
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {01db25f3-1b76-4d97-88c8-1c90634d88fb}4⤵PID:1456
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {01db25f3-1b76-4d97-88c8-1c90634d88fb}5⤵PID:4632
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\taskkill.exe /f /im csgo.exe4⤵PID:2836
-
C:\Windows\System32\taskkill.exeC:\Windows\System32\taskkill.exe /f /im csgo.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5964
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath4⤵PID:3828
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath5⤵PID:3896
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath4⤵PID:2560
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath5⤵PID:5072
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath4⤵PID:1432
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath5⤵PID:3444
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString4⤵PID:6096
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵PID:688
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString4⤵PID:4556
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵PID:4520
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "steam.exe\"" /FO CSV4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280 -
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq steam.exe" /FO CSV5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware4⤵PID:5344
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware5⤵PID:6052
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Users\Admin\AppData\Roaming\com.swiftsoft\exloader\tools\Microsoft_redistributable_packages_x64.exe4⤵PID:5200
-
C:\Users\Admin\AppData\Roaming\com.swiftsoft\exloader\tools\Microsoft_redistributable_packages_x64.exeC:\Users\Admin\AppData\Roaming\com.swiftsoft\exloader\tools\Microsoft_redistributable_packages_x64.exe5⤵PID:3484
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x86_False\8.0.50727.42\vcredist.msi" /qn ARPSYSTEMCOMPONENT=16⤵
- Suspicious use of AdjustPrivilegeToken
PID:6124
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x86_False\8.0.50727.762\vcredist.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:3512
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x86_False\8.0.50727.832\vcredist.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:3652
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x86_False\8.0.50727.3079\vcredist.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:5612
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x86_False\8.0.50727.4053.0\atl80sp1_kb973923.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:5212
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x86_False\8.0.50727.4053\vcredist.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:5264
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x86_False\8.0.50727.5592\vcredist.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:5140
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x86\8.0.50727.6195\vcredist.msi" /qn6⤵PID:1912
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /x "{9BE518E6-ECC6-35A9-88E4-87755C07200F}" /qn6⤵PID:2112
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x86_False\9.0.21022.8.0\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:5364
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x86_False\9.0.21022.8\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:4916
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x86_False\9.0.21022.218\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:6000
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x86_False\9.0.30411.0\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:4180
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x86_False\9.0.30729.1.0\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:4100
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x86_False\9.0.30729.1\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:4872
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x86_False\9.0.30729.17\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:1300
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x86_False\9.0.30729.4048\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:1128
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x86_False\9.0.30729.4148.0\atl90sp1_kb973924.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:4188
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x86_False\9.0.30729.4148\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:4344
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x86_False\9.0.30729.5570\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:3316
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x86\9.0.30729.6161\vc_red.msi" /qn6⤵PID:2468
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /x "{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}" /qn6⤵PID:3760
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2010_x86_False\10.0.30319.1\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:632
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2010_x86\10.0.40219.473\vc_red.msi" /qn6⤵PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x86.exe" /quiet /uninstall6⤵
- Adds Run key to start application
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x86.exe" /quiet /uninstall -burn.unelevated BurnPipe.{73D3CEF3-49E9-4792-BACD-C854F2E3D316} {DE3B4955-4FF1-45B9-96A0-8CDE9FC4FAB9} 45647⤵PID:1632
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x86_eng.exe" /quiet /uninstall6⤵
- Adds Run key to start application
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x86_eng.exe" /quiet /uninstall -burn.unelevated BurnPipe.{DEF95577-A32D-48F0-8CA1-3E41DB261525} {8336E679-22F4-4C35-AF03-89E6A9890158} 16047⤵PID:1200
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /x "{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}" /qn6⤵PID:1920
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False_v\11.0.50727.1\vcRuntimeMinimum_x86\vc_runtimeMinimum_x86.msi" /qn6⤵
- Enumerates connected drives
PID:4520
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False_v\11.0.50727.1\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi" /qn6⤵
- Enumerates connected drives
PID:1624
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.51106.1\vcRuntimeMinimum_x86\vc_runtimeMinimum_x86.msi" /qn6⤵
- Enumerates connected drives
PID:4288
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.51106.1\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi" /qn6⤵
- Enumerates connected drives
PID:4924
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.60610.1\vcRuntimeMinimum_x86\vc_runtimeMinimum_x86.msi" /qn6⤵
- Enumerates connected drives
PID:2896
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.60610.1\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi" /qn6⤵
- Enumerates connected drives
PID:5852
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86\11.0.61030.0\vcRuntimeMinimum_x86\vc_runtimeMinimum_x86.msi" /qn6⤵PID:2520
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86\11.0.61030.0\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi" /qn6⤵
- Enumerates connected drives
PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86\11.0.61030.0\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86\11.0.61030.0\vcredist_x86.exe" /quiet /norestart6⤵
- Adds Run key to start application
- Modifies registry class
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86\11.0.61030.0\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86\11.0.61030.0\vcredist_x86.exe" /quiet /norestart -burn.unelevated BurnPipe.{E21674A6-0795-47C5-8A10-79F56812C4A4} {67BF2D21-F205-472F-AD30-5572DE668725} 30287⤵PID:4456
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.61030.0\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.61030.0\vcredist_x86_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.61030.0\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.61030.0\vcredist_x86_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{2BE8C2B8-B2C8-4F47-8F81-A23256566A95} {18060CBA-1B7F-4774-8E5A-9F981FC653EA} 24367⤵PID:1908
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.60610.1\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.60610.1\vcredist_x86.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.60610.1\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.60610.1\vcredist_x86.exe" /quiet /norestart -burn.unelevated BurnPipe.{333B8C70-7932-488D-92A5-851B1E683481} {12236ED5-9DD3-479F-8973-BDB5B670ECEC} 11367⤵PID:3672
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.60610.1\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.60610.1\vcredist_x86_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.60610.1\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.60610.1\vcredist_x86_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{D9BB05F5-769E-4208-AB84-07C85F5B5740} {36581580-5331-494E-8104-30E0A1B8260A} 37407⤵PID:664
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.51106.1\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.51106.1\vcredist_x86.exe" /quiet /norestart6⤵PID:5500
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.51106.1\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.51106.1\vcredist_x86.exe" /quiet /norestart -burn.unelevated BurnPipe.{F805861A-B28A-433F-BB48-47DC488630B9} {1D81CAB8-416D-4F70-A3E2-1F1E48CD4914} 55007⤵PID:5612
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.51106.1\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.51106.1\vcredist_x86_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.51106.1\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False\11.0.51106.1\vcredist_x86_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{143212B5-D69B-4438-9C4B-BF0995D566A6} {29A883EF-7842-4C97-9D84-A7EEDC7BD761} 35847⤵PID:5412
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False_v\11.0.50727.1\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False_v\11.0.50727.1\vcredist_x86.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False_v\11.0.50727.1\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False_v\11.0.50727.1\vcredist_x86.exe" /quiet /norestart -burn.unelevated BurnPipe.{A9234570-DE98-4178-B969-AA3BA1A27E4E} {EAB13D34-7BAE-45BB-B680-D363E30F7BD0} 40767⤵PID:4852
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False_v\11.0.50727.1\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False_v\11.0.50727.1\vcredist_x86_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False_v\11.0.50727.1\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x86_False_v\11.0.50727.1\vcredist_x86_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{909CC958-02ED-4E30-996C-9E0FC6F85FDA} {8197A7B2-4C18-45B2-9876-F7C4125E804B} 23647⤵PID:5504
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x86.exe" /quiet /uninstall6⤵
- Adds Run key to start application
PID:5940 -
C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x86.exe" /quiet /uninstall -burn.unelevated BurnPipe.{A09A4C57-36ED-47CE-8543-5844B8B2C811} {4C16AAA3-F7E6-406B-93F1-4B7CC0323E33} 59407⤵PID:6064
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x86_eng.exe" /quiet /uninstall6⤵
- Adds Run key to start application
PID:5140 -
C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x86_eng.exe" /quiet /uninstall -burn.unelevated BurnPipe.{5DEE121C-5FBB-4837-9C07-8EA288307262} {F5A4283D-EE4B-46F2-988E-78842D372F4C} 51407⤵PID:3960
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /x "{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}" /qn6⤵PID:3040
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.30501.0\vcRuntimeMinimum_x86\vc_runtimeMinimum_x86.msi" /qn6⤵
- Enumerates connected drives
PID:2200
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.30501.0\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi" /qn6⤵
- Enumerates connected drives
PID:4964
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40649.5\vcRuntimeMinimum_x86\vc_runtimeMinimum_x86.msi" /qn6⤵
- Enumerates connected drives
PID:4992
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40649.5\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi" /qn6⤵
- Enumerates connected drives
PID:5716
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40660.0\vcRuntimeMinimum_x86\vc_runtimeMinimum_x86.msi" /qn6⤵PID:4848
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40660.0\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi" /qn6⤵
- Enumerates connected drives
PID:5080
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86\12.0.40664.0\vcRuntimeMinimum_x86\vc_runtimeMinimum_x86.msi" /qn6⤵
- Enumerates connected drives
PID:4680
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86\12.0.40664.0\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi" /qn6⤵
- Enumerates connected drives
PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86\12.0.40664.0\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86\12.0.40664.0\vcredist_x86.exe" /quiet /norestart6⤵
- Adds Run key to start application
- Modifies registry class
PID:5364 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86\12.0.40664.0\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86\12.0.40664.0\vcredist_x86.exe" /quiet /norestart -burn.unelevated BurnPipe.{F6283E82-74F4-42B0-ADDE-4B117EFDC8DF} {FF0E0311-F67B-45D6-B9D3-9CE16D4515DE} 53647⤵PID:3532
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40664.0\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40664.0\vcredist_x86_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40664.0\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40664.0\vcredist_x86_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{F42FC80A-CB0B-4AAF-8C5C-8703B04E515E} {5F859AAB-6E62-40DA-8174-694187F30B71} 34727⤵PID:4192
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2019_x86\14.20.27508.1\vcRuntimeMinimum_x86\vc_runtimeMinimum_x86.msi" /qn6⤵PID:5292
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2019_x86\14.20.27508.1\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi" /qn6⤵
- Enumerates connected drives
PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2019_x86\14.20.27508.1\VC_redist.x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2019_x86\14.20.27508.1\VC_redist.x86.exe" /quiet /norestart6⤵PID:4316
-
C:\Windows\Temp\{C55C1B98-C725-4556-B534-0BA7D51A6762}\.cr\VC_redist.x86.exe"C:\Windows\Temp\{C55C1B98-C725-4556-B534-0BA7D51A6762}\.cr\VC_redist.x86.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2019_x86\14.20.27508.1\VC_redist.x86.exe" -burn.filehandle.attached=540 -burn.filehandle.self=648 /quiet /norestart7⤵PID:5724
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x64_False\8.0.50727.42\vcredist.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:3720
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x64_False\8.0.50727.762\vcredist.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:5136
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x64_False\8.0.50727.832\vcredist.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:3344
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x64_False\8.0.50727.3079\vcredist.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:1504
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x64_False\8.0.50727.4053.0\atl80sp1_kb973923.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:4236
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x64_False\8.0.50727.4053\vcredist.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:4480
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x64_False\8.0.50727.5592\vcredist.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:4220
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2005_x64\8.0.50727.6195\vcredist.msi" /qn6⤵PID:1404
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /x "{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}" /qn6⤵PID:5112
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x64_False\9.0.21022.8.0\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:5628
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x64_False\9.0.21022.8\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:2032
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x64_False\9.0.21022.218\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:3948
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x64_False\9.0.30411.0\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:5696
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x64_False\9.0.30729.1.0\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:5608
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x64_False\9.0.30729.1\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:5468
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x64_False\9.0.30729.17\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:4276
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x64_False\9.0.30729.4048\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:5412
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x64_False\9.0.30729.4148.0\atl90sp1_kb973924.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:5236
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x64_False\9.0.30729.4148\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:3956
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x64_False\9.0.30729.5570\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:3380
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2008_x64\9.0.30729.6161\vc_red.msi" /qn6⤵PID:5900
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /x "{1D8E6291-B0D5-35EC-8441-6616F567A0F7}" /qn6⤵PID:3064
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2010_x64_False\10.0.30319.1\vc_red.msi" /qn ARPSYSTEMCOMPONENT=16⤵PID:3276
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2010_x64\10.0.40219.473\vc_red.msi" /qn6⤵PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x64.exe" /quiet /uninstall6⤵
- Adds Run key to start application
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x64.exe" /quiet /uninstall -burn.unelevated BurnPipe.{E1877EC9-409C-4150-959E-8D601FF73835} {E8FD98B4-0CB9-41CF-B02E-E8C1A612A626} 28487⤵PID:4584
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x64_eng.exe" /quiet /uninstall6⤵
- Adds Run key to start application
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp7\vcredist_x64_eng.exe" /quiet /uninstall -burn.unelevated BurnPipe.{0FA619E1-2918-41EB-9554-05CDAAD3ED32} {6F27F0F6-F6C2-4E08-B9B0-4FAA71BAD394} 10807⤵PID:3284
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /x "{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}" /qn6⤵PID:4880
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False_v\11.0.50727.1\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi" /qn6⤵
- Enumerates connected drives
PID:392
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False_v\11.0.50727.1\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi" /qn6⤵
- Enumerates connected drives
PID:4916
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.51106.1\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi" /qn6⤵PID:4716
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.51106.1\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi" /qn6⤵
- Enumerates connected drives
PID:3648
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.60610.1\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi" /qn6⤵
- Enumerates connected drives
PID:2844
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.60610.1\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi" /qn6⤵
- Enumerates connected drives
PID:4060
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64\11.0.61030.0\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi" /qn6⤵
- Enumerates connected drives
PID:5508
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64\11.0.61030.0\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi" /qn6⤵
- Enumerates connected drives
PID:3856
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64\11.0.61030.0\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64\11.0.61030.0\vcredist_x64.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:5340 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64\11.0.61030.0\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64\11.0.61030.0\vcredist_x64.exe" /quiet /norestart -burn.unelevated BurnPipe.{C5CCCF1E-1177-4F9F-8372-2035A2CEA6DE} {DF55F23D-1753-4291-9D1B-E9A8C166D49E} 53407⤵PID:5664
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.61030.0\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.61030.0\vcredist_x64_eng.exe" /quiet /norestart6⤵PID:5808
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.61030.0\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.61030.0\vcredist_x64_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{24087808-DCB1-488B-852D-A566040B3EA8} {3B0271A3-81FF-4CE6-A06E-2969B2F8D9B5} 58087⤵PID:2588
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.60610.1\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.60610.1\vcredist_x64.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.60610.1\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.60610.1\vcredist_x64.exe" /quiet /norestart -burn.unelevated BurnPipe.{3C766DDD-5CF3-4357-9C52-7769BB596C04} {E7DDCE76-BB86-4451-8E45-2F51B3AF241A} 45487⤵PID:4616
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.60610.1\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.60610.1\vcredist_x64_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.60610.1\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.60610.1\vcredist_x64_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{8A4D07F5-4A2E-462A-B880-C8C79A1C0F17} {3CD4EB31-9ED4-4CF2-B8EC-B3AB14E2FF61} 39247⤵PID:4332
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.51106.1\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.51106.1\vcredist_x64.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.51106.1\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.51106.1\vcredist_x64.exe" /quiet /norestart -burn.unelevated BurnPipe.{B5733687-963B-4BC5-B1C5-FE78B51F56AC} {E00C38A4-6DAE-4E01-96FB-7F513E62142F} 42927⤵PID:4748
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.51106.1\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.51106.1\vcredist_x64_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.51106.1\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False\11.0.51106.1\vcredist_x64_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{4D704AC9-AF97-42E7-8094-023594DB1AD1} {618E97B6-2AB5-41ED-B529-1CE5045870D4} 14767⤵PID:992
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False_v\11.0.50727.1\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False_v\11.0.50727.1\vcredist_x64.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False_v\11.0.50727.1\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False_v\11.0.50727.1\vcredist_x64.exe" /quiet /norestart -burn.unelevated BurnPipe.{40DA05A0-FB76-47A8-8F01-E52FC47C145B} {E2821176-3B10-429D-BFF3-FDC74E3C0CD4} 31807⤵PID:1432
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False_v\11.0.50727.1\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False_v\11.0.50727.1\vcredist_x64_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
- Modifies registry class
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False_v\11.0.50727.1\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2012_x64_False_v\11.0.50727.1\vcredist_x64_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{10AB0AF4-EECB-4CE6-A098-0A9729DE35BA} {5678BEE3-3B76-4CC3-8232-B4748D657D8A} 21967⤵PID:1020
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x64.exe" /quiet /uninstall6⤵
- Adds Run key to start application
PID:440 -
C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x64.exe" /quiet /uninstall -burn.unelevated BurnPipe.{E59080A3-9750-454A-AC81-B1DBDE8B37CA} {F5EE38DA-80C9-4DC9-B697-8CA3BECE788B} 4407⤵PID:796
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x64_eng.exe" /quiet /uninstall6⤵
- Adds Run key to start application
PID:5620 -
C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\nsi.tmp5\vcredist_x64_eng.exe" /quiet /uninstall -burn.unelevated BurnPipe.{7572AE33-752E-4276-A084-1D32CAC86E66} {7A1C22F7-A18B-45F7-8911-DBD2F1DB2313} 56207⤵PID:3240
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /x "{CB0836EC-B072-368D-82B2-D3470BF95707}" /qn6⤵PID:1848
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.30501.0\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi" /qn6⤵
- Enumerates connected drives
PID:4260
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.30501.0\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi" /qn6⤵
- Enumerates connected drives
PID:1800
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40649.5\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi" /qn6⤵
- Enumerates connected drives
PID:2008
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40649.5\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi" /qn6⤵
- Enumerates connected drives
PID:5836
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40660.0\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi" /qn6⤵
- Enumerates connected drives
PID:1404
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40660.0\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi" /qn6⤵
- Enumerates connected drives
PID:4268
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64\12.0.40664.0\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi" /qn6⤵
- Enumerates connected drives
PID:1792
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64\12.0.40664.0\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi" /qn6⤵
- Enumerates connected drives
PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64\12.0.40664.0\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64\12.0.40664.0\vcredist_x64.exe" /quiet /norestart6⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64\12.0.40664.0\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64\12.0.40664.0\vcredist_x64.exe" /quiet /norestart -burn.unelevated BurnPipe.{D6AE6835-83C4-4AE2-BD80-2574756997AC} {647ED61B-0C25-409F-923E-1D279C9A22B6} 51127⤵PID:3028
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40664.0\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40664.0\vcredist_x64_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40664.0\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40664.0\vcredist_x64_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{B5AED75C-69D0-463B-8143-643CDC35F182} {C26C14F2-1331-48A8-8A70-BB300A626CDC} 49847⤵PID:5436
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40660.0\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40660.0\vcredist_x64.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:5576 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40660.0\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40660.0\vcredist_x64.exe" /quiet /norestart -burn.unelevated BurnPipe.{C114BA11-6ADA-496B-B8C8-602D152A445D} {5C1B872F-4062-4A45-B5A2-323F650D25AA} 55767⤵PID:4252
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40660.0\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40660.0\vcredist_x64_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
- Modifies registry class
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40660.0\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40660.0\vcredist_x64_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{84DC10D9-29FD-4232-9998-39688E9E796E} {4E6B2842-CCB3-43CC-932F-E2CD7C81A45D} 11367⤵PID:1500
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40660.0\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40660.0\vcredist_x86.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:664 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40660.0\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40660.0\vcredist_x86.exe" /quiet /norestart -burn.unelevated BurnPipe.{56859A90-8CEF-4246-88B5-A301FE18369E} {15BD5E04-B9B1-48E6-8EB7-774292613FA3} 6647⤵PID:2444
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40660.0\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40660.0\vcredist_x86_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:5524 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40660.0\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40660.0\vcredist_x86_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{8C49A274-0C78-4720-A2AD-CA80E7F3DA42} {70214516-1033-4436-A725-42F77F053B96} 55247⤵PID:2740
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40649.5\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40649.5\vcredist_x64.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:5500 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40649.5\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40649.5\vcredist_x64.exe" /quiet /norestart -burn.unelevated BurnPipe.{F88B6120-DA42-46DC-BAE1-8034FBE39F58} {594BB756-0583-4F70-B71E-162A188097C7} 55007⤵PID:5652
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40649.5\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40649.5\vcredist_x64_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:5560 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40649.5\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.40649.5\vcredist_x64_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{66B24D59-2B8F-4AF8-B1FA-B891DC427EE6} {4D792291-E0C9-4B0A-A93F-B223646921E1} 55607⤵PID:3580
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40649.5\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40649.5\vcredist_x86.exe" /quiet /norestart6⤵
- Adds Run key to start application
- Modifies registry class
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40649.5\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40649.5\vcredist_x86.exe" /quiet /norestart -burn.unelevated BurnPipe.{CDC90C4C-AE21-48C0-BA5B-1CD8CE12E205} {3CF31A02-970F-4772-AA5D-93F54ABCC2EC} 42727⤵PID:6068
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40649.5\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40649.5\vcredist_x86_eng.exe" /quiet /norestart6⤵PID:6064
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40649.5\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.40649.5\vcredist_x86_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{07DB70D2-40B2-47FA-B889-6F9553E06F66} {48753C8E-0EF8-48F7-814D-2A6614931215} 60647⤵PID:5048
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.30501.0\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.30501.0\vcredist_x64.exe" /quiet /norestart6⤵PID:5552
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.30501.0\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.30501.0\vcredist_x64.exe" /quiet /norestart -burn.unelevated BurnPipe.{BC90A545-D3B3-4222-B80A-91C6D7586E7A} {829DAF3E-273C-48DA-A699-259A003D5ED4} 55527⤵PID:5540
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.30501.0\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.30501.0\vcredist_x64_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
- Modifies registry class
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.30501.0\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.30501.0\vcredist_x64_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{2B1C7AEC-6863-4ADD-9E57-61C155577FC9} {AB1DBB0B-04BD-4AB4-ABEE-07B5414E05FD} 50607⤵PID:1428
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.30501.0\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.30501.0\vcredist_x86.exe" /quiet /norestart6⤵PID:5968
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.30501.0\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.30501.0\vcredist_x86.exe" /quiet /norestart -burn.unelevated BurnPipe.{1162390E-0E38-4A4C-B9BC-A6ECBC9470DA} {F0B09D77-13D1-4B73-B38C-FC00ED48A05E} 59687⤵PID:6008
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.30501.0\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.30501.0\vcredist_x86_eng.exe" /quiet /norestart6⤵
- Modifies registry class
PID:5644 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.30501.0\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.30501.0\vcredist_x86_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{17CCE670-D046-4C65-AAB1-4348B3ECB796} {6D493528-04B8-414F-B991-CF65B6F07670} 56447⤵PID:2536
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.21005.1\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.21005.1\vcredist_x64.exe" /quiet /norestart6⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.21005.1\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.21005.1\vcredist_x64.exe" /quiet /norestart -burn.unelevated BurnPipe.{505CAA6D-E5B0-4041-B3B8-BACF450BB1AC} {18844A64-5E68-42F6-BA3D-53D1848E1CF3} 19127⤵PID:5348
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.21005.1\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.21005.1\vcredist_x64_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:5716 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.21005.1\vcredist_x64_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x64_False\12.0.21005.1\vcredist_x64_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{9FAAFA47-8E89-47F3-8523-5434D91C8758} {0B2A82A2-0D99-405C-A880-37735EA814BE} 57167⤵PID:2472
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.21005.1\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.21005.1\vcredist_x86.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.21005.1\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.21005.1\vcredist_x86.exe" /quiet /norestart -burn.unelevated BurnPipe.{C53E3665-8968-4874-8F9B-B455523906F5} {1B91C4B3-5D56-41A5-A7BD-A7895E71172B} 46807⤵PID:3520
-
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.21005.1\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.21005.1\vcredist_x86_eng.exe" /quiet /norestart6⤵
- Adds Run key to start application
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.21005.1\vcredist_x86_eng.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2013_x86_False\12.0.21005.1\vcredist_x86_eng.exe" /quiet /norestart -burn.unelevated BurnPipe.{A6A0BFA1-3131-47AD-8322-83C0256C3C9E} {64596E87-D24A-488A-AEFB-0D49861F29E3} 31447⤵PID:2808
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2019_x64\14.20.27508.1\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi" /qn6⤵
- Enumerates connected drives
PID:3944
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i "C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2019_x64\14.20.27508.1\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi" /qn6⤵
- Enumerates connected drives
PID:4716
-
-
C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2019_x64\14.20.27508.1\VC_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2019_x64\14.20.27508.1\VC_redist.x64.exe" /quiet /norestart6⤵PID:4052
-
C:\Windows\Temp\{B52CD302-B3A3-487E-80D0-0104D9AB1158}\.cr\VC_redist.x64.exe"C:\Windows\Temp\{B52CD302-B3A3-487E-80D0-0104D9AB1158}\.cr\VC_redist.x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\VCRedist\VCRedist_2019_x64\14.20.27508.1\VC_redist.x64.exe" -burn.filehandle.attached=544 -burn.filehandle.self=552 /quiet /norestart7⤵PID:5128
-
-
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "csgo.exe\"" /FO CSV4⤵PID:2428
-
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq csgo.exe" /FO CSV5⤵
- Enumerates processes with tasklist
PID:972
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "faceitclient.exe\"" /FO CSV4⤵PID:3668
-
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq faceitclient.exe" /FO CSV5⤵
- Enumerates processes with tasklist
PID:364
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "faceitservice.exe\"" /FO CSV4⤵PID:920
-
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq faceitservice.exe" /FO CSV5⤵
- Enumerates processes with tasklist
PID:3384
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 62DBF9290209B993A9A757D1160F9B244⤵PID:4492
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 62DBF9290209B993A9A757D1160F9B245⤵PID:2140
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 438E4D7EBE39F1538BBF28DCEA2603304⤵PID:428
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 438E4D7EBE39F1538BBF28DCEA2603305⤵PID:944
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 7C9F8B73BF303523781852719CD9C7004⤵PID:4976
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 7C9F8B73BF303523781852719CD9C7005⤵PID:424
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f a4cab25097f64d640a42c11e4b7fc34d4⤵PID:1388
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f a4cab25097f64d640a42c11e4b7fc34d5⤵PID:1656
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {35459b22-19a6-44ec-8d34-27eb3131acac}4⤵PID:2084
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {35459b22-19a6-44ec-8d34-27eb3131acac}5⤵PID:4988
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f Microsoft.VS.VC_RuntimeAdditional_x86,v114⤵PID:5072
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f Microsoft.VS.VC_RuntimeAdditional_x86,v115⤵PID:4948
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {0f12c81f-93ef-46ec-bc94-d952c1a775d4}4⤵PID:6048
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {0f12c81f-93ef-46ec-bc94-d952c1a775d4}5⤵PID:1548
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {f65db027-aff3-4070-886a-0d87064aabb1}4⤵PID:5964
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {f65db027-aff3-4070-886a-0d87064aabb1}5⤵PID:4920
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full" /v Release4⤵PID:4000
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full" /v Release5⤵PID:2488
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware4⤵PID:4164
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware5⤵PID:2000
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware4⤵PID:544
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware5⤵PID:4220
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\taskkill.exe /f /im csgo.exe4⤵PID:2248
-
C:\Windows\System32\taskkill.exeC:\Windows\System32\taskkill.exe /f /im csgo.exe5⤵
- Kills process with taskkill
PID:2456
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath4⤵PID:5380
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath5⤵PID:2336
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath4⤵PID:2264
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath5⤵PID:5188
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath4⤵PID:1424
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath5⤵PID:5908
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString4⤵PID:3320
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵
- Adds Run key to start application
PID:5112
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString4⤵PID:4592
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵PID:1048
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "steam.exe\"" /FO CSV4⤵PID:6116
-
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq steam.exe" /FO CSV5⤵
- Enumerates processes with tasklist
PID:1740
-
-
-
C:\Program Files\ExLoader\ExLoader.exe"C:\Program Files\ExLoader\ExLoader.exe"4⤵PID:5180
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography /v MachineGuid5⤵PID:2364
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography /v MachineGuid6⤵PID:5140
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid5⤵PID:5900
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid6⤵PID:1744
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath5⤵PID:3736
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath6⤵PID:1428
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath5⤵PID:5772
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath6⤵PID:1804
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath5⤵PID:6136
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath6⤵PID:5332
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵PID:4072
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString6⤵PID:4828
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵PID:4284
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString6⤵PID:4684
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "steam.exe\"" /FO CSV5⤵PID:1912
-
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq steam.exe" /FO CSV6⤵
- Enumerates processes with tasklist
PID:1044
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "csgo.exe\"" /FO CSV5⤵PID:1148
-
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq csgo.exe" /FO CSV6⤵
- Enumerates processes with tasklist
PID:4052
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "faceitclient.exe\"" /FO CSV5⤵PID:5200
-
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq faceitclient.exe" /FO CSV6⤵
- Enumerates processes with tasklist
PID:5220
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "faceitservice.exe\"" /FO CSV5⤵PID:4436
-
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq faceitservice.exe" /FO CSV6⤵
- Enumerates processes with tasklist
PID:4632
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 6138DFD21FE9012309C8C46B91161CCA5⤵PID:5904
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 6138DFD21FE9012309C8C46B91161CCA6⤵PID:3496
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f F90E4FA5B9C5FAA37B1345D4D38C12DD5⤵PID:5784
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f F90E4FA5B9C5FAA37B1345D4D38C12DD6⤵PID:5336
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 8520DAD7C5154DD39846DB1714990E7F5⤵PID:4204
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 8520DAD7C5154DD39846DB1714990E7F6⤵PID:5732
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 3e43b73803c7c394f8a6b2f0402e19c25⤵PID:2132
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Products /f 3e43b73803c7c394f8a6b2f0402e19c26⤵PID:3724
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {95716cce-fc71-413f-8ad5-56c2892d4b3a}5⤵PID:3536
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {95716cce-fc71-413f-8ad5-56c2892d4b3a}6⤵PID:4332
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {050d4fc8-5d48-4b8f-8972-47c82c46020f}5⤵PID:3344
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {050d4fc8-5d48-4b8f-8972-47c82c46020f}6⤵PID:1684
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {8e70e4e1-06d7-470b-9f74-a51bef21088e}5⤵PID:3004
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f {8e70e4e1-06d7-470b-9f74-a51bef21088e}6⤵PID:5724
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f Microsoft.VS.VC_RuntimeAdditional_amd64,v115⤵PID:4108
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CLASSES_ROOT\Installer\Dependencies /f Microsoft.VS.VC_RuntimeAdditional_amd64,v116⤵PID:4524
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full" /v Release5⤵PID:4756
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full" /v Release6⤵PID:1632
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware5⤵PID:5520
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware6⤵PID:2196
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware5⤵PID:5068
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware6⤵PID:4292
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\taskkill.exe /f /im csgo.exe5⤵PID:4708
-
C:\Windows\System32\taskkill.exeC:\Windows\System32\taskkill.exe /f /im csgo.exe6⤵
- Kills process with taskkill
PID:5656
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath5⤵PID:4112
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath6⤵PID:1848
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath5⤵PID:808
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath6⤵PID:1884
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath5⤵PID:1800
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath6⤵PID:4868
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵PID:2000
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString6⤵PID:3880
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString5⤵PID:4996
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString6⤵PID:6084
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "steam.exe\"" /FO CSV5⤵PID:2512
-
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq steam.exe" /FO CSV6⤵
- Enumerates processes with tasklist
PID:804
-
-
-
C:\Program Files\ExLoader\ExLoader.exe"C:\Program Files\ExLoader\ExLoader.exe"5⤵PID:3500
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography /v MachineGuid6⤵PID:4008
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography /v MachineGuid7⤵PID:3448
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid6⤵PID:4592
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid7⤵PID:5232
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath6⤵PID:5404
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valve\Steam /v InstallPath7⤵PID:6116
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath6⤵PID:5136
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Valve\Steam /v InstallPath7⤵PID:5096
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath6⤵PID:6072
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_CURRENT_USER\SOFTWARE\Valve\Steam /v SteamPath7⤵PID:4396
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString6⤵PID:4656
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString7⤵PID:5108
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /C C:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString6⤵PID:4672
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Steam /v UninstallString7⤵PID:3896
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -command C:\Windows\System32\tasklist.exe /FI "\"IMAGENAME" eq "steam.exe\"" /FO CSV6⤵PID:228
-
C:\Windows\System32\tasklist.exe"C:\Windows\System32\tasklist.exe" /FI "IMAGENAME eq steam.exe" /FO CSV7⤵
- Enumerates processes with tasklist
PID:5228
-
-
-
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v InstallDate3⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v InstallDate4⤵PID:4764
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware3⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware4⤵PID:2132
-
-
-
C:\Users\Admin\AppData\Local\Temp\OperaSetup.exeC:\Users\Admin\AppData\Local\Temp\OperaSetup.exe --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\OperaSetup.exeC:\Users\Admin\AppData\Local\Temp\OperaSetup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=91.0.4516.20 --initial-client-data=0x2e8,0x2ec,0x2f0,0x2e4,0x2cc,0x74ae3fc8,0x74ae3fd8,0x74ae3fe44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\OperaSetup.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\OperaSetup.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\OperaSetup.exe"C:\Users\Admin\AppData\Local\Temp\OperaSetup.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --pin-additional-shortcuts=1 --run-at-startup=0 --server-tracking-data=server_tracking_data --initial-pid=3116 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20220924135632" --session-guid=7b9e3c8c-6927-4230-ba2a-d1005c7688d1 --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=6C050000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\OperaSetup.exeC:\Users\Admin\AppData\Local\Temp\OperaSetup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=91.0.4516.20 --initial-client-data=0x2e4,0x2f4,0x2f8,0x2c0,0x2fc,0x72853fc8,0x72853fd8,0x72853fe45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\installer.exe"C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\installer.exe" --backend --initial-pid=3116 --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --pin-additional-shortcuts=1 --run-at-startup=0 --server-tracking-data=server_tracking_data --package-dir="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202209241356321" --session-guid=7b9e3c8c-6927-4230-ba2a-d1005c7688d1 --server-tracking-blob="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 " --silent --desktopshortcut=1 --install-subfolder=91.0.4516.215⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\installer.exeC:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\installer.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=91.0.4516.21 --initial-client-data=0x2a0,0x2a4,0x2a8,0x27c,0x2ac,0x7ffbbb558dd0,0x7ffbbb558de0,0x7ffbbb558df06⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2260
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\launcher.exe"C:\Users\Admin\AppData\Local\Programs\Opera\launcher.exe" --start-maximized6⤵
- Executes dropped EXE
PID:1264 -
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --start-maximized --ran-launcher7⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
PID:4424 -
C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_crashreporter.exeC:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_crashreporter.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=91.0.4516.21 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2c0,0x2f0,0x7ffbb4781a10,0x7ffbb4781a20,0x7ffbb4781a308⤵
- Executes dropped EXE
PID:620
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=gpu-process --start-stack-profiler --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1864,i,5395580843561567246,8449393681155211577,131072 /prefetch:28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2160
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --enable-quic --start-stack-profiler --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=1948 --field-trial-handle=1864,i,5395580843561567246,8449393681155211577,131072 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3888
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202209241356321\assistant\_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202209241356321\assistant\_sfx.exe"4⤵
- Executes dropped EXE
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202209241356321\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202209241356321\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202209241356321\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202209241356321\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=91.0.4516.16 --initial-client-data=0x280,0x284,0x288,0x25c,0x28c,0xa18748,0xa18758,0xa187645⤵
- Executes dropped EXE
PID:4084
-
-
-
-
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe query HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography /v MachineGuid1⤵PID:4192
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --start-maximized --ran-launcher --flag-switches-begin --flag-switches-end --enable-quic --lowered-browser1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Enumerates system info in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4744 -
C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_crashreporter.exeC:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_crashreporter.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=91.0.4516.21 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2c0,0x2f0,0x7ffbb4781a10,0x7ffbb4781a20,0x7ffbb4781a302⤵
- Executes dropped EXE
PID:2144
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=gpu-process --start-stack-profiler --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3520
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --enable-quic --start-stack-profiler --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=1852 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3164
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=2304 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4100
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=2740 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4072
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=3080 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3784
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=3096 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4040
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=3108 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1392
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=3120 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1080
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=3132 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3448
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --display-capture-permissions-policy-allowed --start-stack-profiler --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=3356 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
PID:2644
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=3364 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
PID:1884
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --mojo-platform-channel-handle=4380 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
PID:3432
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --mojo-platform-channel-handle=4388 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
PID:540
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --mojo-platform-channel-handle=4428 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
PID:1744
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=4436 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
PID:616
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4784 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
PID:4132
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=4896 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
PID:5128
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=5160 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:5296
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=5276 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
PID:5312
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=5344 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:5336
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5448 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
PID:5368
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5512 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
PID:5456
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=5556 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
PID:5556
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --mojo-platform-channel-handle=6112 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
PID:5648
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=6544 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:5752
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=6424 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:5812
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=6484 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:5896
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_autoupdate.exe"C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_autoupdate.exe" --user-data-dir="C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable" --pipeid=oauc_pipe2906202b27b41e4bd66c9238c4b575c12⤵
- Executes dropped EXE
PID:5676
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=6416 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:5964
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=5136 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:5996
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=6548 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:6036
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=6572 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:6080
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=6556 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:224
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=6408 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:1848
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=6580 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:3852
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=6604 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:4220
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=6780 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:4764
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=3352 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:2096
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=4136 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:1648
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=5148 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:2260
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --mojo-platform-channel-handle=3132 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
PID:2108
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=3916 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:5760
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=7304 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:5972
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=8756 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:4268
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=8788 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:1252
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --mojo-platform-channel-handle=9092 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Checks computer location settings
PID:6108
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=8268 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:1804
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=3360 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:1480
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=9404 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:6096
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=8848 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:5996
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=6452 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:5752
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=6400 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:1624
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=4200 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=8616 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:5164
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=8216 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵
- Executes dropped EXE
PID:5760
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=8164 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:6052
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=7804 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:5820
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --mojo-platform-channel-handle=8060 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:82⤵PID:5592
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --with-feature:aliexpress-modal=off --with-feature:booking-modal=off --with-feature:continue-on-booking=on --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:in-house-autocomplete-send=on --with-feature:native-crypto-wallet=on --with-feature:partner-dropdown-suggestions-boost=on --with-feature:personalized-speeddials=on --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:scrollable-tab-strip=off --with-feature:sd-suggestions-external=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:startpage-sync-banner-ref=on --with-feature:yandex-zen-iframe-scroll=on --with-feature:yandex-zen-leads-for-nonsdusers=off --with-feature:yandex-zen-lift-up=off --with-feature:yandex-zen-news=off --with-feature:yandex-zen-news-next=on --with-feature:yat-emoji-addresses=on --with-feature:installer-experiment-test=off --ab_tests=GROW-2648-variant9:GROW-2648 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=59 --mojo-platform-channel-handle=8788 --field-trial-handle=1956,i,7032887320731400096,10712071787371986739,131072 /prefetch:12⤵
- Checks computer location settings
PID:4180
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_autoupdate.exe"C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_autoupdate.exe" --edition --host=https://autoupdate.geo.opera.com/ --installationdatadir="C:\Users\Admin\AppData\Local\Programs\Opera" --installdir="C:\Users\Admin\AppData\Local\Programs\Opera" --lang=en-US --pipeid --producttype --requesttype=shutdown --version=91.0.4516.21 --user-data-dir="C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable" --firstrunver=91.0.4516.21 --firstrunts=1664027828 --consent-info=eyJzdGF0aXN0aWNzX2NvbGxlY3Rpb25fZW5hYmxlZCI6dHJ1ZSwidXNlcl9leHBlcmllbmNlX21ldHJpY3NfcmVwb3J0aW5nX2VuYWJsZWQiOnRydWV92⤵PID:4068
-
C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_autoupdate.exeC:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_autoupdate.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=91.0.4516.21 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7a7732718,0x7ff7a7732728,0x7ff7a77327383⤵PID:5808
-
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_autoupdate.exeC:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_autoupdate.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=91.0.4516.21 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7a7732718,0x7ff7a7732728,0x7ff7a77327381⤵
- Executes dropped EXE
PID:5796
-
C:\Users\Admin\AppData\Local\Programs\Opera\launcher.exeC:\Users\Admin\AppData\Local\Programs\Opera\launcher.exe --scheduledautoupdate --autoupdaterequesttype=automatic --autoupdateoperaversion=91.0.4516.21 --newautoupdaterlogic1⤵
- Executes dropped EXE
PID:5744 -
C:\Users\Admin\AppData\Local\Temp\.opera\72A8C838D015\installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\72A8C838D015\installer.exe" --version2⤵PID:6100
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_autoupdate.exe"C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_autoupdate.exe" --pipeid=oauc_task_pipedcbb8f53eff625f232ff45d764476217 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\.opera\72A8C838D015" --scheduledtask2⤵PID:4636
-
C:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_autoupdate.exeC:\Users\Admin\AppData\Local\Programs\Opera\91.0.4516.21\opera_autoupdate.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\.opera\72A8C838D015 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Temp\.opera\72A8C838D015\Crash Reports" --crash-count-file=C:\Users\Admin\AppData\Local\Temp\.opera\72A8C838D015\crash_count.txt --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=91.0.4516.21 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff7a7732718,0x7ff7a7732728,0x7ff7a77327383⤵PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\72A8C838D015\installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\72A8C838D015\installer.exe" --version3⤵PID:4676
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:388 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E8AA8DDC297C8B3CCBAD66DD069116812⤵PID:5932
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 79FA6FDB3DD3699091C53888363C8EBD2⤵PID:4456
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding BDD65B2FE6E0D0F8C391F8B38B4270BD2⤵PID:8
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 70F128A305B74088BA893B1064BDB5522⤵PID:5316
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 180F12D5F96E14569635B4D048B200472⤵PID:5228
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0E82773B90A106CDF1778E99E58659642⤵PID:5804
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 633799539578FD7EC204279C4B8881202⤵PID:5888
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C3B06B7EA52D69D9764BFCD5200F33932⤵PID:3432
-
-
\??\c:\Windows\syswow64\MsiExec.exec:\Windows\syswow64\MsiExec.exe -Embedding 4F2408BC9934359914A70DAF51EC01B32⤵PID:1264
-
-
\??\c:\Windows\syswow64\MsiExec.exec:\Windows\syswow64\MsiExec.exe -Embedding 6E5FEDEB0ADB2E438C2BFDA9B9CB233A2⤵PID:2080
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9C883880EBC76D5831433BC46EDB0DDD2⤵PID:4444
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A7BDBE9415D1BE46D30F24507B25340F2⤵PID:5392
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 087BFBF06749D0CD21A02D362F4F064D2⤵PID:1164
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1FAD307F849D46DDEF01FA7CA7AEE0382⤵PID:3004
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1CB6CA0D7672D12D30849B806A19532D2⤵PID:2636
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0E33963C23CA44F07A201FBA7BBFD2952⤵PID:1308
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0FF83BF563C03413F33711B9159487802⤵PID:3168
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 51E08D8F4778BC2C18DCF91F0984257C2⤵PID:2248
-
-
\??\c:\Windows\System32\MsiExec.exec:\Windows\System32\MsiExec.exe -Embedding 0160A308C63A7FEFD843133F9CDF12B22⤵PID:3500
-
-
\??\c:\Windows\System32\MsiExec.exec:\Windows\System32\MsiExec.exe -Embedding 591C2E502588E8DD334953383AA1EC742⤵PID:3044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5e3e0ed49525ef464febcd950614d8f51
SHA1cfb6fa3685d60be50160366aa828a849cb8776b6
SHA256194cbdac9a7587d7f824e6bf2f782963b65532142eea5ec53b5d475dbc5dc6c9
SHA512bca835ed8e5fb14574d148caee270b398c1d63995a0a8a64f82e361ac6e8377d51ce902aec7ffacfb6c00ae1582b63324fe57cdb155037b4830700209d0a48b6
-
Filesize
198KB
MD5e3e0ed49525ef464febcd950614d8f51
SHA1cfb6fa3685d60be50160366aa828a849cb8776b6
SHA256194cbdac9a7587d7f824e6bf2f782963b65532142eea5ec53b5d475dbc5dc6c9
SHA512bca835ed8e5fb14574d148caee270b398c1d63995a0a8a64f82e361ac6e8377d51ce902aec7ffacfb6c00ae1582b63324fe57cdb155037b4830700209d0a48b6
-
Filesize
558KB
MD5bf78c15068d6671693dfcdfa5770d705
SHA14418c03c3161706a4349dfe3f97278e7a5d8962a
SHA256a88b8c1c8f27bf90fe960e0e8bd56984ad48167071af92d96ec1051f89f827fb
SHA5125b6b0ab4e82cc979eaa619d387c6995198fd19aa0c455bef44bd37a765685575d57448b3b4accd70d3bd20a6cd408b1f518eda0f6dae5aa106f225bee8291372
-
Filesize
94KB
MD511d9ac94e8cb17bd23dea89f8e757f18
SHA1d4fb80a512486821ad320c4fd67abcae63005158
SHA256e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e
SHA512aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778
-
Filesize
36KB
MD57667b0883de4667ec87c3b75bed84d84
SHA1e6f6df83e813ed8252614a46a5892c4856df1f58
SHA25604e7ccbdcad7cbaf0ed28692fb08eab832c38aad9071749037ee7a58f45e9d7d
SHA512968cbaafe416a9e398c5bfd8c5825fa813462ae207d17072c035f916742517edc42349a72ab6795199d34ccece259d5f2f63587cfaeb0026c0667632b05c5c74
-
Filesize
12.9MB
MD5648cbc045cc5e3200f186c6bbab623dd
SHA1e6d0dfaeb1f38b0c11f22723bba0dbaf6ae1cd4c
SHA2562f9a78e5a9652c831951467901cf1b4fe21140be914c7056ab7521f721b0f941
SHA51245426507b9f5defb64ce9bc3f4f2fab26e4a5725cac8aea59978ab187fd9a8f1d176fba6dff975a932955a0a8f2acb9283603f33f0fb12e4debc40119fec9013
-
Filesize
14KB
MD552ad5cc49021424359d4d5e4d3678021
SHA119924abbd6f83e6012bfcf9fc2777551c662b3ed
SHA256ddae0aefdc781f2675357f4f7f7c2ca5483f828ebf0aba44b3956cdd09a0c078
SHA5125d7ea29a47a02217a5f571530ede425b07d28eb282591c84a873646ac873e13cadc9228daded8e17d3afab7b67961724d261903380176f563314e3b0be8a9b3e
-
Filesize
541B
MD5207cb008b22eb824caab114233ec6e2a
SHA1d957e89dd778129368ed48b4bcaa0453b36b1688
SHA25694154480f043fda7c0987bf247e8ece44458cb3e9e17d2c6bade2ece30f219cc
SHA512c633356b9a202e5d4aa9e50960d3a9bff7095995823af2d9d6528d765d67090592fda4496b0674c85b6f04a8df4abc4b81266da00a5c48e010995867d49675eb
-
Filesize
1.5MB
MD595db9098c58fd6db106f1116bae85a0b
SHA199c98dac2ef47bf393f3dcbfa79120c6456c2ebb
SHA25606e81144996425d00162ba62f990dcbd98ec87e10f43851fd924fae5bf37be57
SHA512b1d64cde416e23f5ab90d91dafd1c8009d399df715c8e37abfbe882036b93afa1f5f87d99620c24c38c6665010ad5f2ab753443c41dff7117f3def06fd3b4832
-
Filesize
255KB
MD588932dadc42e1bba93b21a76de60ef7a
SHA13320ff5514b32565b0396de4f2064ce17ec9eea4
SHA256c4c8cb572a5a2c43d78b3701f4b2349684e6ca4d1557e469af6065b1e099c26c
SHA512298e1e171dbbe386e1abe153446b883c40910819099f64f54dc9faa95d739be56839537342bbe8dd8408545cb1f8c98878a3524d91af1f11a112d1bfc202657a
-
Filesize
254KB
MD5a98626e1aef6ceba5dfc1ee7112e235a
SHA1ca42fe10fa893f390472859405c7564095e4260f
SHA25692b3d3c6e135eb1dc95f88e6ca75bd6113d9eb3261a95ca39f733e3897e53675
SHA51281761cd87aece3cea03b4520d8c7518f8d549d8e91cce2a4a4752729e7a28ad4b502472731a06f7051f357bfa1042640a5e7592887b1c3914de0dfe230ef882c
-
Filesize
254KB
MD5c88cecbffad6d8e731fd95de49561ebd
SHA14ef29a9163b56df34a3486b98b24be3a3d0cdca6
SHA256bab583d38d105dac9141b287fb2b7763b6d8b0bae97e745faaccedb40a579c29
SHA512d514f33af50e74906617f8a9bb91e91f11a3ad3387f262c78804252df284e860d9d61d0bb4a61b60f122a00749824957bf53e8c308d7a53b722e7b88777c791d
-
Filesize
1KB
MD59cc12b49b54979a31d5222114ff7c880
SHA1aa4894e9a3f756921697f45d8e819ee5c1510f1c
SHA25681eeb21e6fa6d5245f8bb90a080603738e167d381f67aeef0f2a672d3cce5786
SHA5121e26694d57bcc2e4a902fe451f2408527bd90fd4068cb129486ceffb5bea9de6a0b48a844fbc1b40e057f62b173438ea03f88d01439015ce2dc0b415b387de31
-
Filesize
495B
MD5860f8d49c488b32bb5739c471118c252
SHA1b67ce2dd5cf0fd6ce24d6b187150d4a505981aec
SHA2567ad62864a719bf6a2121fd4b7825c608d88d3ecc3616291b141ff21e3e4b2d0d
SHA5123ee573e5c5eecdf40b054d07017e7673dd31ef83a8ceb26212989cc197116d9952863d407af13e210027b77ea090c8afbcb6412aacac20e996a0889f66e0845c
-
Filesize
988B
MD57b9aa21505f509102849e9741b12a5f4
SHA1b7c7ede42d3959fe6484c89206bf761627f508a8
SHA2567b9ba510b5903dbb9b72454a3ea08b2eed41aa0aa497779be14aea1121159a1e
SHA51218b6aa814e9fba04d6dc5c9ecb322281ac5521392da44c7389531adeec353362a78b1dbf440f42774747510846ddaeb46c5b3b43204cceca66c46841b3d3e858
-
Filesize
1KB
MD5e5b1dd7ec4af2485d699892838373674
SHA1b732f6ddf5e1c0676bd4de3ab45b3f8869b457c4
SHA2561c1eeae8816502f2f04563af081002ead84e934c1cc24d483a0565f165a9d222
SHA51218830793a56759ba094fd1fe87315a748d96d650db52323143ab9dabdde3454b76b37436547a5085b8f02c58d143eccb797529485c91b8d65192fd48327bbbb7
-
Filesize
1KB
MD504c67a78e57fe41814a4e5377ee59aa5
SHA1b6fdf3673d8b4265f5be0ccb96c2d47cca3bf2b9
SHA25608a09fc49daf5938395087eb5dde519043aee6f2474ddf30d1af42a6428bc580
SHA5125c16751df901ffd98c61ca30fb67538dbb6b72946f901eaa0bca0896ab56b83bcda7f0e115b38f0ac1b0c85aa63948ac40116d643c756473d82fa4abb45f83d4
-
Filesize
361B
MD5b27ac70f81b9b2fd4354a36302762184
SHA1599acb44c0e534c373df84878b32685254127b7c
SHA2567498275739335d72f1553ac6da40ba121f36d5374383895e7e9ea77a946d6116
SHA5125e7348bf09baee5d685875ede0a881f08468c55d83188c299e0f0b27e5ff31099c289abb1fe70501bab19af4b21b6793adf97ab082e94ecacfc601057a6277ec
-
Filesize
2KB
MD5a6a49eb50acda68193097b384021d5bd
SHA1261e1d9b2450b27678c63d5bedf4513bd6582d70
SHA25625a2d2ae45fe4b903e5a9880ab16fd1d977d58cad899a2ad06264ce809c860d3
SHA512a726a16281c19b940c798ce675c73a77ca1bcbdc3813d9aa7f289ccea37e52ac9baced968ed3f85dbaf0cd75860c6af0bd235733140db29bb7b8a2236711f960
-
Filesize
299B
MD548136cdde28ef3bd42836d10a06b43fb
SHA1623781c566c4cf19d0139b8036ce3bb5b076aa85
SHA2564209cfea7eadb13b87a41dd79083b20aff8830ac3701d85eba9d939dc5b57af3
SHA512ba16dafcab39d4fa8c0295e0f4707284a0f8c90333ee5b6135fd2ddd76f9a9920c40e5cbb730a1cb5a809228d6dbf6f5ad797d9d1e2c783dcea066bbb2a23c55
-
Filesize
3KB
MD5fcca5b3c13e7069f276eb21f3dfb75de
SHA173d7022d1def2a856b26765d036426178f29559a
SHA256f2268c760778dd5dfd57f7678fe60708e8e0f271fc7859c66e15d4be10c4a019
SHA512583a5e4b88cb304f4025b4381de07856bafea8e11308ae8d3c01f81391ddcff85a63097277d315cbbf6809efca2dd16d24a82975de61b28d5e3d7a7d5f6caead
-
Filesize
2KB
MD589e3d8fb40d8aefccf9db8b2191fe839
SHA1b18c68d1e1236d0e4516f73e9893e9d62dcd80b8
SHA2563549a710377aca99691cec4cd9bd01597ba769d2cf4a8ee8666c9d95490f9811
SHA51230235fe1c649f8a8347ff9e0d3af296efb3813bed5466afa521b15925508f7db7aa6888c81617345e89eb42a1fed2db6be6ef7194fbf4b4ff6d4c6da7baf19e5
-
Filesize
752B
MD562b10d52595f974207c3cf61fea334bf
SHA1c3f6a48cff2e3bf92ba0a7a22917bdd9f277523b
SHA25677902ca35bed519645858f14270a367ae0afb0cb1cc353e648ff0dd90857fc3a
SHA512d805c7d086c21450b2566f8da178cd4b7cdc0dcff86fd82309144c8e47e9b027713e4ac358a273c70a23b13ea8ef3fdf1d423f0ddbf793f47ec96829ed832b18
-
Filesize
498B
MD55b896d04e5daea39b5401b8bb0762a93
SHA1cd2f1a700f10c0d54a5bb7baad677a16dcfcbbfa
SHA2564be192cb209633a48c7eae62065f7c8eabdab7e6eb435b1413028fb93e4b5fd0
SHA512682a4a442e56d86153c471e0ae9b74a0aa0c96a3f62e5b69d48e43e1728b57e042dbfe2ca8259ce8dfc69ef28ffd301a2bb92120f3504bce998a65e50c65a5a8
-
Filesize
1KB
MD5dbf11538f040a4a6880550bd7cd0e6d9
SHA1347934640920836a4b4a06323baba6d43163131c
SHA256b82f35aa61245dc8750ed337c04ee4c31277257124eba2d12e93feb346bb7e49
SHA5127ff3a3662f5005855890ce4bd3f977826a7b4d3a465f9419e4208669a404a932696a557cf6f0e754c4ead9bac0221e44c4a9f5e5757a5878f85cba2166aa9796
-
Filesize
330B
MD5776c137f6b6fc0161cccef9229adf74f
SHA1b15b53f6c286d9325995cede4b022689b44c0d8e
SHA256641f30c10af5e892fff394eb39c2d4905ab7851e3146262ca9d6fa8f09163ea5
SHA512b4188e1fd182db4689b6b1aa32d9aa51b882396d49b662df41e1d3d8507c2087fa10136c29c5ec6671e88628fdfba42ebc90c2913f591dd66c7509e24e5d833b
-
Filesize
230B
MD55da2dfbd12c9aacdb03ce0d6dc414a8d
SHA19eccc4092745b13f051d90273af78a6f64a21348
SHA25660a44cb1aecc5a3b6ed5b4224ce83ca001ec42fe22e33b0eccb183b74bb9b4a4
SHA512e7d906f34258bed095aa1358c2dbf575f22ffb8d77e57391e23477801939b0907c927373fe4cc99ebdd30ba5be0adaadad76fbdbc6060788d7869c9047b2049f
-
Filesize
661B
MD58258c0eabe05fed717b2b9833d50ed46
SHA1b0606669a4ea1522355c61059bde7bd3e019ce6a
SHA2569b316dea36d431beb6caf4cc02230c2df7896e259bf46af4ca3f165a9a2697b1
SHA512a69a1308591700f68f35a509dd9796ece0f77c28c73dbdef2c06960287d85b54e9431aeb13faa0820122aa14670bce7409fd3ecccea765701223be22ad26cd4f
-
Filesize
863B
MD55af2290cd10dd99228a08bb7a1f2e57e
SHA153d2e5c87fbb0c610040ad89bda7829b9690beee
SHA2564789df43f5d80437af945bbb1629578a70831282b00bddfcde318661dcfc280a
SHA5129112ee05c06862c21aed54c08b8689529d1ee16fa5a0985e89a6b3299f0fe3d7811765abdf9be6e912cde20da07a40d1903e9c15e526c1a234838575deb1760c
-
Filesize
796KB
MD5dc1d7fbeacfb517e801dcb886074ed42
SHA1ab969ca7aace910f9c906d5ed7473a79caccafc5
SHA256b00f83f6938d2ec735ac8f970c779f8ff28063b91a73d022b7a954bb85231c38
SHA512085815b511544f531effffc46b0ed5cde5834d4c85497487fa5cbd8e7b3dbfef597b63c47c92b5512a1f80e7924ea41ba797c3b90d2818d34630a7f5f0bc3161
-
Filesize
15.1MB
MD58e5e20cdc842a9a1c6d915aa9845e65a
SHA18c0c0449cb7c2d0475d6bbd955ce1402bcea3144
SHA2569be3940dd1e714277ba7c07882020c4d2742fa8092542c314dbae5ccbf31e4c4
SHA512beeb5d40e2f18f685932184d9257862840fcec31c0fe422702fad7ebb9024bf33e081518bc4d4b25fcb96c731898a6a4c2a9ea863bbbcd358730711b2ebfe091
-
Filesize
15.1MB
MD58e5e20cdc842a9a1c6d915aa9845e65a
SHA18c0c0449cb7c2d0475d6bbd955ce1402bcea3144
SHA2569be3940dd1e714277ba7c07882020c4d2742fa8092542c314dbae5ccbf31e4c4
SHA512beeb5d40e2f18f685932184d9257862840fcec31c0fe422702fad7ebb9024bf33e081518bc4d4b25fcb96c731898a6a4c2a9ea863bbbcd358730711b2ebfe091
-
Filesize
15.1MB
MD58e5e20cdc842a9a1c6d915aa9845e65a
SHA18c0c0449cb7c2d0475d6bbd955ce1402bcea3144
SHA2569be3940dd1e714277ba7c07882020c4d2742fa8092542c314dbae5ccbf31e4c4
SHA512beeb5d40e2f18f685932184d9257862840fcec31c0fe422702fad7ebb9024bf33e081518bc4d4b25fcb96c731898a6a4c2a9ea863bbbcd358730711b2ebfe091
-
Filesize
558KB
MD5bf78c15068d6671693dfcdfa5770d705
SHA14418c03c3161706a4349dfe3f97278e7a5d8962a
SHA256a88b8c1c8f27bf90fe960e0e8bd56984ad48167071af92d96ec1051f89f827fb
SHA5125b6b0ab4e82cc979eaa619d387c6995198fd19aa0c455bef44bd37a765685575d57448b3b4accd70d3bd20a6cd408b1f518eda0f6dae5aa106f225bee8291372
-
Filesize
94KB
MD511d9ac94e8cb17bd23dea89f8e757f18
SHA1d4fb80a512486821ad320c4fd67abcae63005158
SHA256e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e
SHA512aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778
-
Filesize
94KB
MD511d9ac94e8cb17bd23dea89f8e757f18
SHA1d4fb80a512486821ad320c4fd67abcae63005158
SHA256e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e
SHA512aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778
-
Filesize
36KB
MD57667b0883de4667ec87c3b75bed84d84
SHA1e6f6df83e813ed8252614a46a5892c4856df1f58
SHA25604e7ccbdcad7cbaf0ed28692fb08eab832c38aad9071749037ee7a58f45e9d7d
SHA512968cbaafe416a9e398c5bfd8c5825fa813462ae207d17072c035f916742517edc42349a72ab6795199d34ccece259d5f2f63587cfaeb0026c0667632b05c5c74
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b
-
Filesize
99KB
MD5053d3b3d3f4e22fbf9b787a434d44ca6
SHA187e8b28a0337286cb40dfef6c60bcf1ab11f0800
SHA256b93e2878e2edb9ec84455950a6cb0ed2d139acd16e24080a46f51a90061d0976
SHA512dd2c03a756a9a1b35d0624ecbf1530c41681b2148415ff32e13c4b28a7353402df66c557e043282e21ea6163f5697478e3e0c5678134146a078d45a618190a80
-
Filesize
99KB
MD5053d3b3d3f4e22fbf9b787a434d44ca6
SHA187e8b28a0337286cb40dfef6c60bcf1ab11f0800
SHA256b93e2878e2edb9ec84455950a6cb0ed2d139acd16e24080a46f51a90061d0976
SHA512dd2c03a756a9a1b35d0624ecbf1530c41681b2148415ff32e13c4b28a7353402df66c557e043282e21ea6163f5697478e3e0c5678134146a078d45a618190a80
-
Filesize
558KB
MD5bf78c15068d6671693dfcdfa5770d705
SHA14418c03c3161706a4349dfe3f97278e7a5d8962a
SHA256a88b8c1c8f27bf90fe960e0e8bd56984ad48167071af92d96ec1051f89f827fb
SHA5125b6b0ab4e82cc979eaa619d387c6995198fd19aa0c455bef44bd37a765685575d57448b3b4accd70d3bd20a6cd408b1f518eda0f6dae5aa106f225bee8291372
-
Filesize
94KB
MD511d9ac94e8cb17bd23dea89f8e757f18
SHA1d4fb80a512486821ad320c4fd67abcae63005158
SHA256e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e
SHA512aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778
-
Filesize
36KB
MD57667b0883de4667ec87c3b75bed84d84
SHA1e6f6df83e813ed8252614a46a5892c4856df1f58
SHA25604e7ccbdcad7cbaf0ed28692fb08eab832c38aad9071749037ee7a58f45e9d7d
SHA512968cbaafe416a9e398c5bfd8c5825fa813462ae207d17072c035f916742517edc42349a72ab6795199d34ccece259d5f2f63587cfaeb0026c0667632b05c5c74
-
Filesize
5.8MB
MD52a9b238323fca61898f7b0492f334f54
SHA1278b68691d6b88e3635ac19546a2b80fcdcac055
SHA25641ef482e6b8e919c25bf69cc11feb8a7c708c760881aabe0be271368e951bef3
SHA51264670ea37f21250a2097d2646381163d31de95c77c0fa8eba94ee07856db8d10c560c07bb31995aebe1f0a5ae014c9b9e81ee06d554297904a6265c7192ed93c
-
Filesize
1KB
MD57b134a5e3b9d796fe5cdff206710f874
SHA134805c55ae0ba64780b4a01132f9e4b923b94abc
SHA25645bd1b5f1ad3d48c1d51ffbdb9dfec572562128fa37087fbadf9589ee05e2d48
SHA5125712dae80d6d7413d7497bb071c102da1e599de0b3893f23f6fc7c864452d4a56dd24f44860a16cf537412fce714d46483dc2586dead601c4b9c9941e9c7644c
-
Filesize
394B
MD5d5db5124c8470ef3d02e3fcb7536a234
SHA11b26ca91230fc342c6afb08dc0601eb8533e77b8
SHA256ce82969b8c44f1f7750c9646d4ffdd1c99d6abb99565deb102dfb37c2c541de6
SHA5128ff3d4786ebc2fe85f9035d85da58ea8953de129fa448b32b4c19eae8d3eb9bcce30399801e6762f6484a0b6d4d5c023d06c5b1ec4e13eddfe131ce9b9561641
-
Filesize
1.5MB
MD595db9098c58fd6db106f1116bae85a0b
SHA199c98dac2ef47bf393f3dcbfa79120c6456c2ebb
SHA25606e81144996425d00162ba62f990dcbd98ec87e10f43851fd924fae5bf37be57
SHA512b1d64cde416e23f5ab90d91dafd1c8009d399df715c8e37abfbe882036b93afa1f5f87d99620c24c38c6665010ad5f2ab753443c41dff7117f3def06fd3b4832
-
Filesize
210KB
MD5903e870339ea32df505f1c603830fa72
SHA1460052cf71efb8ad1cdb354475a888146938f192
SHA256cecedf106e85487dae2d990ce0cfe7e9f4e37f1aa0221b920d41f1afd24a5fef
SHA512730164e0af61822537fe62553525fec3b7943631613c13c99192d5e23328cb0500f9dcb3b47b2b1d1cbec9fe7c039681ad31df00fee0896c6a5ae9a0e6ff7a36
-
Filesize
255KB
MD588932dadc42e1bba93b21a76de60ef7a
SHA13320ff5514b32565b0396de4f2064ce17ec9eea4
SHA256c4c8cb572a5a2c43d78b3701f4b2349684e6ca4d1557e469af6065b1e099c26c
SHA512298e1e171dbbe386e1abe153446b883c40910819099f64f54dc9faa95d739be56839537342bbe8dd8408545cb1f8c98878a3524d91af1f11a112d1bfc202657a
-
Filesize
254KB
MD5a98626e1aef6ceba5dfc1ee7112e235a
SHA1ca42fe10fa893f390472859405c7564095e4260f
SHA25692b3d3c6e135eb1dc95f88e6ca75bd6113d9eb3261a95ca39f733e3897e53675
SHA51281761cd87aece3cea03b4520d8c7518f8d549d8e91cce2a4a4752729e7a28ad4b502472731a06f7051f357bfa1042640a5e7592887b1c3914de0dfe230ef882c
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\flutter_assets\resources\fonts\MONTSERRAT-SEMIBOLD.TTF
Filesize254KB
MD5c88cecbffad6d8e731fd95de49561ebd
SHA14ef29a9163b56df34a3486b98b24be3a3d0cdca6
SHA256bab583d38d105dac9141b287fb2b7763b6d8b0bae97e745faaccedb40a579c29
SHA512d514f33af50e74906617f8a9bb91e91f11a3ad3387f262c78804252df284e860d9d61d0bb4a61b60f122a00749824957bf53e8c308d7a53b722e7b88777c791d
-
Filesize
299B
MD548136cdde28ef3bd42836d10a06b43fb
SHA1623781c566c4cf19d0139b8036ce3bb5b076aa85
SHA2564209cfea7eadb13b87a41dd79083b20aff8830ac3701d85eba9d939dc5b57af3
SHA512ba16dafcab39d4fa8c0295e0f4707284a0f8c90333ee5b6135fd2ddd76f9a9920c40e5cbb730a1cb5a809228d6dbf6f5ad797d9d1e2c783dcea066bbb2a23c55
-
Filesize
330B
MD5776c137f6b6fc0161cccef9229adf74f
SHA1b15b53f6c286d9325995cede4b022689b44c0d8e
SHA256641f30c10af5e892fff394eb39c2d4905ab7851e3146262ca9d6fa8f09163ea5
SHA512b4188e1fd182db4689b6b1aa32d9aa51b882396d49b662df41e1d3d8507c2087fa10136c29c5ec6671e88628fdfba42ebc90c2913f591dd66c7509e24e5d833b
-
Filesize
230B
MD55da2dfbd12c9aacdb03ce0d6dc414a8d
SHA19eccc4092745b13f051d90273af78a6f64a21348
SHA25660a44cb1aecc5a3b6ed5b4224ce83ca001ec42fe22e33b0eccb183b74bb9b4a4
SHA512e7d906f34258bed095aa1358c2dbf575f22ffb8d77e57391e23477801939b0907c927373fe4cc99ebdd30ba5be0adaadad76fbdbc6060788d7869c9047b2049f
-
Filesize
61KB
MD5ee77265024d099499b48ab29fc620991
SHA14fdd41d8037830e9a7849decf73876443812fc83
SHA2566254fc83f3b710db8739ad4e70417e5f77adca61c0908e88f272689619578aa0
SHA512cb532a61118e83d350bc9e36f4dfafc5b31d3809154a78b50b2027b01cd1fed07fd4ec0efe9346826e5a827cee150f6cd2ca2285a46a55e8539febf3a1d6b293
-
Filesize
796KB
MD5dc1d7fbeacfb517e801dcb886074ed42
SHA1ab969ca7aace910f9c906d5ed7473a79caccafc5
SHA256b00f83f6938d2ec735ac8f970c779f8ff28063b91a73d022b7a954bb85231c38
SHA512085815b511544f531effffc46b0ed5cde5834d4c85497487fa5cbd8e7b3dbfef597b63c47c92b5512a1f80e7924ea41ba797c3b90d2818d34630a7f5f0bc3161
-
Filesize
15.1MB
MD58e5e20cdc842a9a1c6d915aa9845e65a
SHA18c0c0449cb7c2d0475d6bbd955ce1402bcea3144
SHA2569be3940dd1e714277ba7c07882020c4d2742fa8092542c314dbae5ccbf31e4c4
SHA512beeb5d40e2f18f685932184d9257862840fcec31c0fe422702fad7ebb9024bf33e081518bc4d4b25fcb96c731898a6a4c2a9ea863bbbcd358730711b2ebfe091
-
Filesize
15.1MB
MD58e5e20cdc842a9a1c6d915aa9845e65a
SHA18c0c0449cb7c2d0475d6bbd955ce1402bcea3144
SHA2569be3940dd1e714277ba7c07882020c4d2742fa8092542c314dbae5ccbf31e4c4
SHA512beeb5d40e2f18f685932184d9257862840fcec31c0fe422702fad7ebb9024bf33e081518bc4d4b25fcb96c731898a6a4c2a9ea863bbbcd358730711b2ebfe091
-
Filesize
558KB
MD5bf78c15068d6671693dfcdfa5770d705
SHA14418c03c3161706a4349dfe3f97278e7a5d8962a
SHA256a88b8c1c8f27bf90fe960e0e8bd56984ad48167071af92d96ec1051f89f827fb
SHA5125b6b0ab4e82cc979eaa619d387c6995198fd19aa0c455bef44bd37a765685575d57448b3b4accd70d3bd20a6cd408b1f518eda0f6dae5aa106f225bee8291372
-
Filesize
94KB
MD511d9ac94e8cb17bd23dea89f8e757f18
SHA1d4fb80a512486821ad320c4fd67abcae63005158
SHA256e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e
SHA512aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778
-
Filesize
94KB
MD511d9ac94e8cb17bd23dea89f8e757f18
SHA1d4fb80a512486821ad320c4fd67abcae63005158
SHA256e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e
SHA512aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778
-
Filesize
94KB
MD511d9ac94e8cb17bd23dea89f8e757f18
SHA1d4fb80a512486821ad320c4fd67abcae63005158
SHA256e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e
SHA512aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778
-
Filesize
36KB
MD57667b0883de4667ec87c3b75bed84d84
SHA1e6f6df83e813ed8252614a46a5892c4856df1f58
SHA25604e7ccbdcad7cbaf0ed28692fb08eab832c38aad9071749037ee7a58f45e9d7d
SHA512968cbaafe416a9e398c5bfd8c5825fa813462ae207d17072c035f916742517edc42349a72ab6795199d34ccece259d5f2f63587cfaeb0026c0667632b05c5c74