Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
11-05-2021 11:26
Static task
static1
Behavioral task
behavioral1
Sample
7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe
Resource
win10v20210410
General
-
Target
7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe
-
Size
991KB
-
MD5
b9f3be6a36336377d5ca0714fad03d70
-
SHA1
38c60e271606ede3a32e1ad98ff07d722c6cdd7e
-
SHA256
7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96
-
SHA512
1b477beaec2bca6a71abb307c6dc5c759cf66f953345ece8cf94343805d89484a4dfe67cded2db5e01e689cb905f31ddc5d56be54b7bd4b34ec0f01fa288647c
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exeSynaptics.exeYandexPackSetup.exe._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exelite_installer.exeseederexe.exe{46C0611B-BD1A-4850-A713-B9428CEF362F}.exeYandex.exeexplorer.exesender.exeyb39B3.tmpsetup.exesetup.exesetup.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.execlidmgr.execlidmgr.execlidmgr.execlidmgr.exeSEARCHBAND.EXEsearchbandapp.exeservice_update.exebrowser.exebrowser.exesearchbandapp64.execrashreporter64.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 2020 ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe 2488 Synaptics.exe 2104 YandexPackSetup.exe 3952 ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe 1604 lite_installer.exe 1800 seederexe.exe 3888 {46C0611B-BD1A-4850-A713-B9428CEF362F}.exe 2204 Yandex.exe 1784 explorer.exe 4120 sender.exe 4316 yb39B3.tmp 4344 setup.exe 4404 setup.exe 4444 setup.exe 4536 service_update.exe 4588 service_update.exe 4620 service_update.exe 4644 service_update.exe 4700 service_update.exe 4736 service_update.exe 4764 service_update.exe 4832 clidmgr.exe 4880 clidmgr.exe 4928 clidmgr.exe 4976 clidmgr.exe 1808 SEARCHBAND.EXE 2068 searchbandapp.exe 4364 service_update.exe 4424 browser.exe 4464 browser.exe 4328 searchbandapp64.exe 4600 crashreporter64.exe 4764 browser.exe 4892 browser.exe 5020 browser.exe 4116 browser.exe 3472 browser.exe 2240 browser.exe 4496 browser.exe 4492 browser.exe 3688 browser.exe 4392 browser.exe 3516 browser.exe 1116 browser.exe 4968 browser.exe 1216 browser.exe 4112 browser.exe 2568 browser.exe 5124 browser.exe 5192 browser.exe 5224 browser.exe 5292 browser.exe 5316 browser.exe 5352 browser.exe 5412 browser.exe 5452 browser.exe 5472 browser.exe 5524 browser.exe 5564 browser.exe 5616 browser.exe 5652 browser.exe 5692 browser.exe 5732 browser.exe 5776 browser.exe -
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
browser.exebrowser.exebrowser.exebrowser.exeYandex.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exe7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exeexplorer.exesearchbandapp.exebrowser.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Yandex.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation 7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation searchbandapp.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation browser.exe -
Loads dropped DLL 64 IoCs
Processes:
MsiExec.exeMsiExec.exebrowser.exebrowser.exesearchbandapp64.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 1864 MsiExec.exe 1864 MsiExec.exe 1864 MsiExec.exe 1864 MsiExec.exe 1864 MsiExec.exe 1864 MsiExec.exe 1864 MsiExec.exe 1864 MsiExec.exe 1864 MsiExec.exe 1864 MsiExec.exe 740 MsiExec.exe 740 MsiExec.exe 740 MsiExec.exe 740 MsiExec.exe 740 MsiExec.exe 740 MsiExec.exe 4424 browser.exe 4464 browser.exe 4424 browser.exe 4328 searchbandapp64.exe 2716 4328 searchbandapp64.exe 4764 browser.exe 4892 browser.exe 4892 browser.exe 4764 browser.exe 4764 browser.exe 4764 browser.exe 5020 browser.exe 5020 browser.exe 4116 browser.exe 4116 browser.exe 3472 browser.exe 3472 browser.exe 2240 browser.exe 2240 browser.exe 4496 browser.exe 4496 browser.exe 4492 browser.exe 3688 browser.exe 4492 browser.exe 3688 browser.exe 4392 browser.exe 4392 browser.exe 3516 browser.exe 3516 browser.exe 1116 browser.exe 4968 browser.exe 1216 browser.exe 1116 browser.exe 4968 browser.exe 4112 browser.exe 1216 browser.exe 4112 browser.exe 2568 browser.exe 5124 browser.exe 5124 browser.exe 2568 browser.exe 5192 browser.exe 5224 browser.exe 5192 browser.exe 5292 browser.exe 5292 browser.exe 5224 browser.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exesearchbandapp64.exebrowser.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\YandexSearchBand = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\SearchBand\\Application\\5.0.0.1903\\searchbandapp64.exe\" /auto" searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\GoogleChromeAutoLaunch_45886AE68CD319C7351FF54A1DBD4B87 = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --shutdown-if-not-closed-by-system-restart" browser.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Drops file in System32 directory 27 IoCs
Processes:
service_update.exeservice_update.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DF8D319B9741B9E1EBE906AACEA5CBBA_A2E0B287EC2147F84DD8A330B45D3489 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_38924EDF39D8802D6946FB22E5DD0835 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E887E036775F4159E2816B7B9E527E5F_E00E8EE5450BF4204EB7927B1BA8F658 service_update.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Yandex\ui service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\68FAF71AF355126BCA00CE2E73CC7374_77B682CF3AAC7B00161DFFF7DEA4CC8C service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\68FAF71AF355126BCA00CE2E73CC7374_77B682CF3AAC7B00161DFFF7DEA4CC8C service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_38924EDF39D8802D6946FB22E5DD0835 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FC68FB72D4FBC7E0F151BC2282D75E47_367FA2447481C3DB640CE44BE2E5A181 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_D21903E2722B551F252C717985D24037 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 service_update.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\_[1].js service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_D21903E2722B551F252C717985D24037 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDA81A73291E20E6ACF6CACA76D5C942_2A2080AC7EEFAA81BA7361978F5743B9 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDA81A73291E20E6ACF6CACA76D5C942_2A2080AC7EEFAA81BA7361978F5743B9 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DF8D319B9741B9E1EBE906AACEA5CBBA_A2E0B287EC2147F84DD8A330B45D3489 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E887E036775F4159E2816B7B9E527E5F_E00E8EE5450BF4204EB7927B1BA8F658 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FC68FB72D4FBC7E0F151BC2282D75E47_367FA2447481C3DB640CE44BE2E5A181 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat service_update.exe -
Drops file in Program Files directory 2 IoCs
Processes:
service_update.exedescription ioc process File created C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe service_update.exe File opened for modification C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe service_update.exe -
Drops file in Windows directory 34 IoCs
Processes:
service_update.exemsiexec.exeservice_update.exeservice_update.exebrowser.exedescription ioc process File created C:\Windows\Fonts\yandex.ttf service_update.exe File opened for modification C:\Windows\Installer\f7427a2.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI3041.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{5B964E0E-B9A3-4276-9ED9-4D5A5720747A} msiexec.exe File opened for modification C:\Windows\Installer\MSIECCA.tmp msiexec.exe File created C:\Windows\Installer\f7427a2.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI315D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE736.tmp msiexec.exe File created C:\Windows\Tasks\System update for Yandex Browser.job service_update.exe File created C:\Windows\Installer\f7427a5.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIE7D5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI322A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE7B4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE881.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE9F9.tmp msiexec.exe File opened for modification C:\Windows\Fonts\yandex.ttf service_update.exe File opened for modification C:\Windows\Installer\MSI2E4A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3090.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI30D0.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{4D922459-6A2E-4E43-B7A1-86872A9078F3} msiexec.exe File created C:\Windows\Installer\f7427a8.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIECEA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2E99.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI32B7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI33C2.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Tasks\Update for Yandex Browser.job service_update.exe File opened for modification C:\Windows\Installer\f7427a5.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2D30.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2FF2.tmp msiexec.exe File created C:\Windows\Tasks\Repairing Yandex Browser update service.job service_update.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Tasks\Обновление Браузера Яндекс.job browser.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
browser.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe -
Processes:
seederexe.exesearchbandapp64.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\NTTopResultURL seederexe.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389 seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" seederexe.exe Key deleted \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} seederexe.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING searchbandapp64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\DisplayName = "Яндекс" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTTopResultURL seederexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\ShowSearchSuggestionsInAddressGlobal = "1" seederexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING\searchbandapp64.exe = "1" searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer\NTLogoPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\SuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer\NTLogoURL = "http://go.microsoft.com/fwlink/?LinkID=403856&language={language}&scale={scalelevel}&contrast={contrast}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTLogoURL = "http://downloader.yandex.net/banner/ntpagelogo/{language}/{scalelevel}.png" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\SuggestionsURLFallback = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" seederexe.exe Key deleted \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer seederexe.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL searchbandapp64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\SuggestionsURL seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTURL = "https://yandex.ru/search/?win=489&clid=2337531-200&text={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\FaviconURLFallback = "http://www.bing.com/favicon.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\Local\\MICROS~1\\INTERN~1\\Services\\YANDEX~1.ICO" seederexe.exe Key deleted \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389 seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\NTLogoURL = "http://go.microsoft.com/fwlink/?LinkID=403856&language={language}&scale={scalelevel}&contrast={contrast}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\URL = "https://yandex.ru/search/?win=489&clid=2337528-200&text={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer\DisplayName = "Bing" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer\NTSuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&market={language}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IENTSS" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "https://yandex.ru/search/?win=489&clid=2337528-200&text={searchTerms}" seederexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\searchbandapp64.exe = "0" searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer\URL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IESR02" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURLFallback = "https://www.yandex.ru/favicon.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURL seederexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE\LinksBandEnabled = "1" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\DisplayName = "Bing" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\NTURL = "https://yandex.ru/search/?win=489&clid=2337531-200&text={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\NTLogoURL = "http://downloader.yandex.net/banner/ntpagelogo/{language}/{scalelevel}.png" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer\FaviconURLFallback = "http://www.bing.com/favicon.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer\FaviconURL = "http://www.bing.com/favicon.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer\SuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL\searchbandapp64.exe = "1" searchbandapp64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\DisplayName = "Яндекс" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\SuggestionsURL_JSON = "https://suggest.yandex.ru/suggest-ff.cgi?uil=ru&part={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\YaCreationDate = "2021-49-11" seederexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM\searchbandapp64.exe = "0" searchbandapp64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer\NTURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTSR" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\FaviconURL = "http://www.bing.com/favicon.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\URL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IESR02" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\NTTopResultURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTTR" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{0633EE93-D776-472f-A0FF-E1416B8B2E3A}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\FaviconURLFallback = "https://www.yandex.ru/favicon.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer\SuggestionsURLFallback = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\buffer\NTTopResultURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTTR" seederexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\searchbandapp64.exe = "11000" searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM searchbandapp64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURL_JSON = "https://suggest.yandex.ru/suggest-ff.cgi?uil=ru&part={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\NTSuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&market={language}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IENTSS" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\NTLogoPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\7091d108-b270-11eb-9d1d-f29cea8fb389\FaviconPath = "C:\\Users\\Admin\\AppData\\Local\\MICROS~1\\INTERN~1\\Services\\YANDEX~1.ICO" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\YaCreationDate = "2021-49-11" seederexe.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
seederexe.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "https://www.yandex.ru/?win=489&clid=2337527-200" seederexe.exe -
Modifies data under HKEY_USERS 58 IoCs
Processes:
service_update.exeservice_update.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Yandex\UICreated_SYSTEM = "1" service_update.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs service_update.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Yandex service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates service_update.exe -
Modifies registry class 64 IoCs
Processes:
setup.exeseederexe.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.pdf\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexGIF.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexJS.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexJPEG.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexSWF.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.infected setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.xhtml setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.jpg setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\yabrowser\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexFB2.NIDVTDEWN2AX6R6MCBSRJSO3WY\ = "Yandex Browser FB2 Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexGIF.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.xht\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.xml\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexCRX.NIDVTDEWN2AX6R6MCBSRJSO3WY\ = "Yandex Browser CRX Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexCRX.NIDVTDEWN2AX6R6MCBSRJSO3WY\DefaultIcon setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.pdf setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\yabrowser\shell\open setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.crx\ = "YandexBrowser.crx" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexTXT.NIDVTDEWN2AX6R6MCBSRJSO3WY\ = "Yandex Browser TXT Document" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexHTML.NIDVTDEWN2AX6R6MCBSRJSO3WY\Application\ApplicationName = "Yandex" setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.webp setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge seederexe.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexJS.NIDVTDEWN2AX6R6MCBSRJSO3WY setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexWEBP.NIDVTDEWN2AX6R6MCBSRJSO3WY setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexPDF.NIDVTDEWN2AX6R6MCBSRJSO3WY setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.webm\OpenWithProgids\YandexWEBM.NIDVTDEWN2AX6R6MCBSRJSO3WY setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexWEBM.NIDVTDEWN2AX6R6MCBSRJSO3WY setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.epub\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.htm setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexGIF.NIDVTDEWN2AX6R6MCBSRJSO3WY\ = "Yandex Browser GIF Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexINFE.NIDVTDEWN2AX6R6MCBSRJSO3WY setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexCRX.NIDVTDEWN2AX6R6MCBSRJSO3WY\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-104" setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.epub setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.xml setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexBrowser.crx\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexCSS.NIDVTDEWN2AX6R6MCBSRJSO3WY\ = "Yandex Browser CSS Document" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexPNG.NIDVTDEWN2AX6R6MCBSRJSO3WY\ = "Yandex Browser PNG Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexSWF.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.jpg\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\yabrowser\shell\ = "open" setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexCSS.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexXML.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexPNG.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexWEBM.NIDVTDEWN2AX6R6MCBSRJSO3WY\DefaultIcon setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\yabrowser\shell\open\ddeexec setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexXML.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open\command setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.epub\OpenWithProgids\YandexEPUB.NIDVTDEWN2AX6R6MCBSRJSO3WY setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexPDF.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexPDF.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.xhtml\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.webm setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\yabrowser\URL Protocol setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexCSS.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexINFE.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexSWF.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.crx\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.txt\OpenWithProgids\YandexTXT.NIDVTDEWN2AX6R6MCBSRJSO3WY setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexEPUB.NIDVTDEWN2AX6R6MCBSRJSO3WY setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexGIF.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexHTML.NIDVTDEWN2AX6R6MCBSRJSO3WY\ = "Yandex Browser HTML Document" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexJS.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexHTML.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexCRX.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\YandexEPUB.NIDVTDEWN2AX6R6MCBSRJSO3WY\shell\open setup.exe -
Processes:
._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exelite_installer.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 0f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520033000000620000000100000020000000cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b1400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc1d000000010000001000000001728e1ecf7a9d86fb3cec8948aba953030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 lite_installer.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\SystemCertificates\CA\Certificates\87A63D9ADB627D777836153C680A3DFCF27DE90C ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C lite_installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 lite_installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 lite_installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 lite_installer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\SystemCertificates\CA\Certificates\87A63D9ADB627D777836153C680A3DFCF27DE90C\Blob = 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 ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
YandexPackSetup.exemsiexec.exelite_installer.exeseederexe.exesender.exesetup.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeSEARCHBAND.EXEsearchbandapp.exeservice_update.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 2104 YandexPackSetup.exe 2104 YandexPackSetup.exe 3156 msiexec.exe 3156 msiexec.exe 1604 lite_installer.exe 1604 lite_installer.exe 1604 lite_installer.exe 1604 lite_installer.exe 1800 seederexe.exe 1800 seederexe.exe 1800 seederexe.exe 1800 seederexe.exe 1800 seederexe.exe 1800 seederexe.exe 1800 seederexe.exe 1800 seederexe.exe 4120 sender.exe 4120 sender.exe 4404 setup.exe 4404 setup.exe 4536 service_update.exe 4536 service_update.exe 4588 service_update.exe 4588 service_update.exe 4620 service_update.exe 4620 service_update.exe 4620 service_update.exe 4620 service_update.exe 4700 service_update.exe 4700 service_update.exe 4736 service_update.exe 4736 service_update.exe 4764 service_update.exe 4764 service_update.exe 1808 SEARCHBAND.EXE 1808 SEARCHBAND.EXE 3156 msiexec.exe 3156 msiexec.exe 2068 searchbandapp.exe 2068 searchbandapp.exe 4364 service_update.exe 4364 service_update.exe 4404 setup.exe 4404 setup.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4764 browser.exe 4892 browser.exe 4892 browser.exe 4892 browser.exe 4892 browser.exe 5020 browser.exe 4116 browser.exe 3472 browser.exe 2240 browser.exe 4496 browser.exe 4492 browser.exe 4492 browser.exe 3688 browser.exe 4492 browser.exe 4492 browser.exe 4392 browser.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
YandexPackSetup.exemsiexec.exeSEARCHBAND.EXEdescription pid process Token: SeShutdownPrivilege 2104 YandexPackSetup.exe Token: SeIncreaseQuotaPrivilege 2104 YandexPackSetup.exe Token: SeSecurityPrivilege 3156 msiexec.exe Token: SeCreateTokenPrivilege 2104 YandexPackSetup.exe Token: SeAssignPrimaryTokenPrivilege 2104 YandexPackSetup.exe Token: SeLockMemoryPrivilege 2104 YandexPackSetup.exe Token: SeIncreaseQuotaPrivilege 2104 YandexPackSetup.exe Token: SeMachineAccountPrivilege 2104 YandexPackSetup.exe Token: SeTcbPrivilege 2104 YandexPackSetup.exe Token: SeSecurityPrivilege 2104 YandexPackSetup.exe Token: SeTakeOwnershipPrivilege 2104 YandexPackSetup.exe Token: SeLoadDriverPrivilege 2104 YandexPackSetup.exe Token: SeSystemProfilePrivilege 2104 YandexPackSetup.exe Token: SeSystemtimePrivilege 2104 YandexPackSetup.exe Token: SeProfSingleProcessPrivilege 2104 YandexPackSetup.exe Token: SeIncBasePriorityPrivilege 2104 YandexPackSetup.exe Token: SeCreatePagefilePrivilege 2104 YandexPackSetup.exe Token: SeCreatePermanentPrivilege 2104 YandexPackSetup.exe Token: SeBackupPrivilege 2104 YandexPackSetup.exe Token: SeRestorePrivilege 2104 YandexPackSetup.exe Token: SeShutdownPrivilege 2104 YandexPackSetup.exe Token: SeDebugPrivilege 2104 YandexPackSetup.exe Token: SeAuditPrivilege 2104 YandexPackSetup.exe Token: SeSystemEnvironmentPrivilege 2104 YandexPackSetup.exe Token: SeChangeNotifyPrivilege 2104 YandexPackSetup.exe Token: SeRemoteShutdownPrivilege 2104 YandexPackSetup.exe Token: SeUndockPrivilege 2104 YandexPackSetup.exe Token: SeSyncAgentPrivilege 2104 YandexPackSetup.exe Token: SeEnableDelegationPrivilege 2104 YandexPackSetup.exe Token: SeManageVolumePrivilege 2104 YandexPackSetup.exe Token: SeImpersonatePrivilege 2104 YandexPackSetup.exe Token: SeCreateGlobalPrivilege 2104 YandexPackSetup.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeRestorePrivilege 3156 msiexec.exe Token: SeTakeOwnershipPrivilege 3156 msiexec.exe Token: SeShutdownPrivilege 1808 SEARCHBAND.EXE Token: SeIncreaseQuotaPrivilege 1808 SEARCHBAND.EXE -
Suspicious use of FindShellTrayWindow 48 IoCs
Processes:
YandexPackSetup.exeexplorer.exesearchbandapp.exesearchbandapp64.exebrowser.exepid process 2104 YandexPackSetup.exe 2104 YandexPackSetup.exe 1784 explorer.exe 2068 searchbandapp.exe 2068 searchbandapp.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe -
Suspicious use of SendNotifyMessage 41 IoCs
Processes:
searchbandapp.exesearchbandapp64.exebrowser.exepid process 2068 searchbandapp.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4424 browser.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
searchbandapp64.exebrowser.exepid process 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4328 searchbandapp64.exe 4424 browser.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exemsiexec.exeMsiExec.exeseederexe.exeYandex.exe{46C0611B-BD1A-4850-A713-B9428CEF362F}.exeyb39B3.tmpsetup.exesetup.exeservice_update.exeservice_update.exeservice_update.exedescription pid process target process PID 2680 wrote to memory of 2020 2680 7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe PID 2680 wrote to memory of 2020 2680 7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe PID 2680 wrote to memory of 2020 2680 7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe PID 2680 wrote to memory of 2488 2680 7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe Synaptics.exe PID 2680 wrote to memory of 2488 2680 7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe Synaptics.exe PID 2680 wrote to memory of 2488 2680 7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe Synaptics.exe PID 2020 wrote to memory of 2104 2020 ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe YandexPackSetup.exe PID 2020 wrote to memory of 2104 2020 ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe YandexPackSetup.exe PID 2020 wrote to memory of 2104 2020 ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe YandexPackSetup.exe PID 2020 wrote to memory of 3952 2020 ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe PID 2020 wrote to memory of 3952 2020 ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe PID 2020 wrote to memory of 3952 2020 ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe ._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe PID 3156 wrote to memory of 1864 3156 msiexec.exe MsiExec.exe PID 3156 wrote to memory of 1864 3156 msiexec.exe MsiExec.exe PID 3156 wrote to memory of 1864 3156 msiexec.exe MsiExec.exe PID 1864 wrote to memory of 1604 1864 MsiExec.exe lite_installer.exe PID 1864 wrote to memory of 1604 1864 MsiExec.exe lite_installer.exe PID 1864 wrote to memory of 1604 1864 MsiExec.exe lite_installer.exe PID 1864 wrote to memory of 1800 1864 MsiExec.exe seederexe.exe PID 1864 wrote to memory of 1800 1864 MsiExec.exe seederexe.exe PID 1864 wrote to memory of 1800 1864 MsiExec.exe seederexe.exe PID 1800 wrote to memory of 2204 1800 seederexe.exe Yandex.exe PID 1800 wrote to memory of 2204 1800 seederexe.exe Yandex.exe PID 1800 wrote to memory of 2204 1800 seederexe.exe Yandex.exe PID 2204 wrote to memory of 1784 2204 Yandex.exe explorer.exe PID 2204 wrote to memory of 1784 2204 Yandex.exe explorer.exe PID 2204 wrote to memory of 1784 2204 Yandex.exe explorer.exe PID 1800 wrote to memory of 4120 1800 seederexe.exe sender.exe PID 1800 wrote to memory of 4120 1800 seederexe.exe sender.exe PID 1800 wrote to memory of 4120 1800 seederexe.exe sender.exe PID 3888 wrote to memory of 4316 3888 {46C0611B-BD1A-4850-A713-B9428CEF362F}.exe yb39B3.tmp PID 3888 wrote to memory of 4316 3888 {46C0611B-BD1A-4850-A713-B9428CEF362F}.exe yb39B3.tmp PID 3888 wrote to memory of 4316 3888 {46C0611B-BD1A-4850-A713-B9428CEF362F}.exe yb39B3.tmp PID 4316 wrote to memory of 4344 4316 yb39B3.tmp setup.exe PID 4316 wrote to memory of 4344 4316 yb39B3.tmp setup.exe PID 4316 wrote to memory of 4344 4316 yb39B3.tmp setup.exe PID 4344 wrote to memory of 4404 4344 setup.exe setup.exe PID 4344 wrote to memory of 4404 4344 setup.exe setup.exe PID 4344 wrote to memory of 4404 4344 setup.exe setup.exe PID 4404 wrote to memory of 4444 4404 setup.exe setup.exe PID 4404 wrote to memory of 4444 4404 setup.exe setup.exe PID 4404 wrote to memory of 4444 4404 setup.exe setup.exe PID 4404 wrote to memory of 4536 4404 setup.exe service_update.exe PID 4404 wrote to memory of 4536 4404 setup.exe service_update.exe PID 4404 wrote to memory of 4536 4404 setup.exe service_update.exe PID 4536 wrote to memory of 4588 4536 service_update.exe service_update.exe PID 4536 wrote to memory of 4588 4536 service_update.exe service_update.exe PID 4536 wrote to memory of 4588 4536 service_update.exe service_update.exe PID 4620 wrote to memory of 4644 4620 service_update.exe service_update.exe PID 4620 wrote to memory of 4644 4620 service_update.exe service_update.exe PID 4620 wrote to memory of 4644 4620 service_update.exe service_update.exe PID 4620 wrote to memory of 4700 4620 service_update.exe service_update.exe PID 4620 wrote to memory of 4700 4620 service_update.exe service_update.exe PID 4620 wrote to memory of 4700 4620 service_update.exe service_update.exe PID 4700 wrote to memory of 4736 4700 service_update.exe service_update.exe PID 4700 wrote to memory of 4736 4700 service_update.exe service_update.exe PID 4700 wrote to memory of 4736 4700 service_update.exe service_update.exe PID 4620 wrote to memory of 4764 4620 service_update.exe service_update.exe PID 4620 wrote to memory of 4764 4620 service_update.exe service_update.exe PID 4620 wrote to memory of 4764 4620 service_update.exe service_update.exe PID 4404 wrote to memory of 4832 4404 setup.exe clidmgr.exe PID 4404 wrote to memory of 4832 4404 setup.exe clidmgr.exe PID 4404 wrote to memory of 4832 4404 setup.exe clidmgr.exe PID 4404 wrote to memory of 4880 4404 setup.exe clidmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe"C:\Users\Admin\AppData\Local\Temp\7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe"C:\Users\Admin\AppData\Local\Temp\._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe"C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe" /passive /msicl "VID=200 YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y "3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exeC:\Users\Admin\AppData\Local\Temp\._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exe --stat dwnldr/p=8958/cnt=0/dt=2/ct=0/rt=0 --dh 2128 --st 16207481473⤵
- Executes dropped EXE
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C2CFA95F3058E0B09EC3D039286CEABF2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0C731CE9-21AE-4127-839C-FAE369003C4D\lite_installer.exe"C:\Users\Admin\AppData\Local\Temp\0C731CE9-21AE-4127-839C-FAE369003C4D\lite_installer.exe" --use-user-default-locale --silent --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --YABROWSER3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\CAF6A3A5-A45B-4C90-BCCB-6D0A9B4513EE\seederexe.exe"C:\Users\Admin\AppData\Local\Temp\CAF6A3A5-A45B-4C90-BCCB-6D0A9B4513EE\seederexe.exe" "--yqs=y" "--yhp=y" "--ilight=" "--oem=" "--nopin=n" "--pin_custom=n" "--pin_desktop=n" "--pin_taskbar=y" "--locale=us" "--browser=y" "--browser_default=" "--loglevel=trace" "--ess=" "--clids=C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml" "--sender=C:\Users\Admin\AppData\Local\Temp\6FCA9D6B-CB0E-45E5-8488-7E273AC746AB\sender.exe" "--is_elevated=yes" "--ui_level=3" "--good_token=x" "--no_opera=n"3⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent --pin-taskbar=y --pin-desktop=n4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\pin\explorer.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent --pin-taskbar=y --pin-desktop=n /pin-path="C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.lnk" --is-pinning5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\6FCA9D6B-CB0E-45E5-8488-7E273AC746AB\sender.exeC:\Users\Admin\AppData\Local\Temp\6FCA9D6B-CB0E-45E5-8488-7E273AC746AB\sender.exe --send "/status.xml?clid=2337526-200&uuid=3960e29a-59FA-45ED-BC42-42BE10ECbf99&vnt=Windows 10x64&file-no=10%0A11%0A12%0A13%0A14%0A15%0A17%0A18%0A20%0A21%0A22%0A23%0A25%0A36%0A38%0A40%0A42%0A43%0A57%0A59%0A89%0A103%0A106%0A123%0A124%0A125%0A129%0A"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D33790CF2A5BA1C75D4F5592E796ADBE2⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\{46C0611B-BD1A-4850-A713-B9428CEF362F}.exe"C:\Users\Admin\AppData\Local\Temp\{46C0611B-BD1A-4850-A713-B9428CEF362F}.exe" --job-name=yBrowserDownloader-{095C2330-D380-4D09-AFAD-20F7261778D2} --send-statistics --local-path=C:\Users\Admin\AppData\Local\Temp\{46C0611B-BD1A-4850-A713-B9428CEF362F}.exe --YABROWSER --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --silent --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=2337555-200&ui=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --use-user-default-locale1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\yb39B3.tmp"C:\Users\Admin\AppData\Local\Temp\yb39B3.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --install-start-time-no-uac=288623107 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --job-name=yBrowserDownloader-{095C2330-D380-4D09-AFAD-20F7261778D2} --local-path="C:\Users\Admin\AppData\Local\Temp\{46C0611B-BD1A-4850-A713-B9428CEF362F}.exe" --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=0 --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=2337555-200&ui=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --send-statistics --silent --source=lite --use-user-default-locale --variations-update-path="C:\Users\Admin\AppData\Local\Temp\ef311c24-d30b-4e2a-99cd-421afdb3ab7e.tmp" --verbose-logging --yabrowser --yandex-website-icon-file="C:\Users\Admin\AppData\Local\Temp\website.ico"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\BROWSER.PACKED.7Z" --searchband-file="C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\SEARCHBAND.EXE" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --install-start-time-no-uac=288623107 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --job-name=yBrowserDownloader-{095C2330-D380-4D09-AFAD-20F7261778D2} --local-path="C:\Users\Admin\AppData\Local\Temp\{46C0611B-BD1A-4850-A713-B9428CEF362F}.exe" --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=0 --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=2337555-200&ui=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --send-statistics --silent --source=lite --use-user-default-locale --variations-update-path="C:\Users\Admin\AppData\Local\Temp\ef311c24-d30b-4e2a-99cd-421afdb3ab7e.tmp" --verbose-logging --yabrowser --yandex-website-icon-file="C:\Users\Admin\AppData\Local\Temp\website.ico"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\BROWSER.PACKED.7Z" --searchband-file="C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\SEARCHBAND.EXE" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --install-start-time-no-uac=288623107 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --job-name=yBrowserDownloader-{095C2330-D380-4D09-AFAD-20F7261778D2} --local-path="C:\Users\Admin\AppData\Local\Temp\{46C0611B-BD1A-4850-A713-B9428CEF362F}.exe" --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=0 --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=2337555-200&ui=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --send-statistics --silent --source=lite --use-user-default-locale --variations-update-path="C:\Users\Admin\AppData\Local\Temp\ef311c24-d30b-4e2a-99cd-421afdb3ab7e.tmp" --verbose-logging --yabrowser --yandex-website-icon-file="C:\Users\Admin\AppData\Local\Temp\website.ico" --verbose-logging --run-as-admin --target-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application" --child-setup-process --restart-as-admin-time=3130449124⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=4404 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=21.3.3.234 --initial-client-data=0x304,0x308,0x30c,0x2e0,0x310,0xec4690,0xec46a0,0xec46ac5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\21.3.3.234\service_update.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\21.3.3.234\service_update.exe" --setup5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe" --install6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids.xml"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source4404_631194821\Browser-bin\clids_yandex_second.xml"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=searchband --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=searchband --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source4404_631194821\Browser-bin\clids_searchband.xml"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\SEARCHBAND.EXE"C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\SEARCHBAND.EXE" /forcequiet5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe" --run-as-service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=4620 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=21.3.3.234 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0xfc7458,0xfc7468,0xfc74742⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe" --update-scheduler2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe" --update-background-scheduler3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe" --statistics=https://api.browser.yandex.ru/installstats/send/dtype=stred/pid=457/cid=72992/path=extended_stat/vars=-action=version_folder_files_check_unused,-brand_id=unknown,-error=FONT_NOT_FOUND,-files_mask=66977119,-installer_type=service_audit,-launched=false,-old_style=0,-old_ver=,-result=0,-stage=error,-target=version_folder_files_check,-ui=39CF29CF_BEC6_4DE7_AF65_D01F54548755/*2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\21.3.3.234\service_update.exe" --update-fingerprint --fingerprint-path="C:\Windows\Fonts\yandex.ttf"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Installer\searchbandapp.exe"C:\Users\Admin\AppData\Local\Yandex\SearchBand\Installer\searchbandapp.exe" /install1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\searchbandapp64.exe"C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\searchbandapp64.exe" /auto2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\crashreporter64.exeC:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\crashreporter64.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --progress-window=0 --install-start-time-no-uac=2886231071⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id= --annotation=main_process_pid=4424 --annotation=metrics_client_id=a65c326aa74c4c7c82b51737125a3987 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=21.3.3.234 --initial-client-data=0x154,0x158,0x15c,0x130,0x160,0x7185b190,0x7185b1a0,0x7185b1ac2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1708 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=network --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Network Service" --mojo-platform-channel-handle=1756 --enable-elf-protection /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Storage Service" --mojo-platform-channel-handle=2560 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://yastatic.net --enable-instaserp --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2448 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=audio --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Audio Service" --mojo-platform-channel-handle=2592 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://yastatic.net --enable-instaserp --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2600 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://yastatic.net --enable-instaserp --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2956 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=video_capture --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Video Capture" --mojo-platform-channel-handle=3180 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://yastatic.net --enable-instaserp --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --mojo-platform-channel-handle=3616 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://yastatic.net --enable-instaserp --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=3912 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://yastatic.net --enable-instaserp --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --mojo-platform-channel-handle=3916 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=3936 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5672 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5684 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5656 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5812 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5820 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5988 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6004 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6036 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6168 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6420 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6424 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6428 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6436 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --disable-gpu-compositing --lang=ru --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://yastatic.net --enable-instaserp --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --mojo-platform-channel-handle=5964 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6628 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6636 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=speechkit.mojom.Speechkit --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=none --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Speechkit Service" --mojo-platform-channel-handle=11356 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=7468 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=7484 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=7464 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6024 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=7460 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=7448 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=7432 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5984 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=7320 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=7336 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=7316 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6960 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6948 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6936 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6924 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6912 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6900 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6896 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6884 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6872 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6860 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6848 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6484 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6464 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5652 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=none --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Утилиты Windows" --mojo-platform-channel-handle=8248 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --disable-gpu-compositing --lang=ru --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://yastatic.net --enable-instaserp --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --mojo-platform-channel-handle=10780 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=4212 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=9944 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=7924 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=7960 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5992 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5256 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=8380 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5648 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=6556 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=8092 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=8024 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=7372 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=11188 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5860 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=9920 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=11076 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=7308 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=9960 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=9952 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=11072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=9664 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=9728 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5672 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=4152 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=4204 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=none --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Утилиты Windows" --mojo-platform-channel-handle=10124 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=none --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Утилиты Windows" --mojo-platform-channel-handle=8376 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=none --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Утилиты Windows" --mojo-platform-channel-handle=2256 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=none --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Импорт профилей" --mojo-platform-channel-handle=7532 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=none --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Импорт профилей" --mojo-platform-channel-handle=1468 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=none --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Импорт профилей" --mojo-platform-channel-handle=1692 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --disable-gpu-compositing --lang=ru --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://yastatic.net --enable-instaserp --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=93 --mojo-platform-channel-handle=2268 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --mojo-platform-channel-handle=5280 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1696,8868790147710902427,1238636314786124173,131072 --lang=ru --service-sandbox-type=utility --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Распаковщик файлов" --mojo-platform-channel-handle=2088 /prefetch:82⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3a41⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater --bits_job_guid={3553CFF6-6F38-43F8-BC61-2F6541EBF1D0}1⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1620748202 --annotation=last_update_date=0 --annotation=launches_after_update=0 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=5592 --annotation=metrics_client_id=a65c326aa74c4c7c82b51737125a3987 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=21.3.3.234 --initial-client-data=0x140,0x144,0x148,0x11c,0x14c,0x7185b190,0x7185b1a0,0x7185b1ac2⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --field-trial-handle=1580,1777719611844824512,18151296399848712582,131072 --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1596 /prefetch:22⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1580,1777719611844824512,18151296399848712582,131072 --lang=ru --service-sandbox-type=network --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Network Service" --mojo-platform-channel-handle=1796 --enable-elf-protection /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater-stat-bits --broupdater-stat-name=install --bits_job_guid={FB503CAA-B566-4CE1-A68B-2433849A6592}1⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1620748202 --annotation=last_update_date=1620748202 --annotation=launches_after_update=2 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=6120 --annotation=metrics_client_id=a65c326aa74c4c7c82b51737125a3987 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=21.3.3.234 --initial-client-data=0x140,0x144,0x148,0x11c,0x14c,0x7185b190,0x7185b1a0,0x7185b1ac2⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --field-trial-handle=1588,9736205862282552462,13722117004193576360,131072 --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1648 /prefetch:22⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1588,9736205862282552462,13722117004193576360,131072 --lang=ru --service-sandbox-type=network --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Network Service" --mojo-platform-channel-handle=1920 --enable-elf-protection /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater-stat-bits --broupdater-stat-name=dayuse --bits_job_guid={490FABE7-6BA3-49AB-AF27-7C341FE5D3FC}1⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1620748202 --annotation=last_update_date=1620748202 --annotation=launches_after_update=2 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=5532 --annotation=metrics_client_id=a65c326aa74c4c7c82b51737125a3987 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=21.3.3.234 --initial-client-data=0x140,0x144,0x148,0x11c,0x14c,0x7185b190,0x7185b1a0,0x7185b1ac2⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --field-trial-handle=1596,11055380296440937106,6902596508788745617,131072 --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1608 /prefetch:22⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1596,11055380296440937106,6902596508788745617,131072 --lang=ru --service-sandbox-type=network --user-id=3960e29a-59FA-45ED-BC42-42BE10ECbf99 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Network Service" --mojo-platform-channel-handle=1792 --enable-elf-protection /prefetch:82⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Synaptics\Synaptics.exeMD5
16c7891d743cb7038d68afb53ae226f0
SHA1026b1d49cead5a094b76fe580343a323e850f4ba
SHA256316776a1d7cf610a6b1d8d8fb92ddaa1984f239501551d27b5a2cc53e9797751
SHA512884fe9247b50dde9265e9dc3daa2cd949b08bbbb169a2f35ce67ed3facc9394783a97111f055d78202e4d4b9dfa6a5313ef9e0f835b2c443b505d215764fb4ea
-
C:\ProgramData\Synaptics\Synaptics.exeMD5
16c7891d743cb7038d68afb53ae226f0
SHA1026b1d49cead5a094b76fe580343a323e850f4ba
SHA256316776a1d7cf610a6b1d8d8fb92ddaa1984f239501551d27b5a2cc53e9797751
SHA512884fe9247b50dde9265e9dc3daa2cd949b08bbbb169a2f35ce67ed3facc9394783a97111f055d78202e4d4b9dfa6a5313ef9e0f835b2c443b505d215764fb4ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501MD5
1ebec61b25461c0185d87eef53ff6258
SHA1762e464265993d47da3ec32e60e7bc48a5d40d89
SHA2568480c4b9a2d195fa75fc66a6898f2e5be53905a052ef0a0889674a20169a6f38
SHA512762d0e404857bca5eb29e6a945218b15cc6be209a53ff7c72df7997d803bc63a08fc261338e654a8b300c1cb55eb1ec51163963629d4050aba6da62818dd68e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_D21903E2722B551F252C717985D24037MD5
4cde0f7d535a1775b13b748952fed1cd
SHA1d06cef4b4908274a18293f03e6d5dc3bfc65275f
SHA256c5a346027dd101ab644d3d1aef0d32369d2368884b3b9065df7021d9480d1337
SHA51219f7dc131619a65c2ad572e9555a0d2497b879abf28720e651ba9775f635be715f3e3840bb7dace55f240301e6f2d0d0d4b3ce51d1b7858aabcacc493a918fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDA81A73291E20E6ACF6CACA76D5C942_2A2080AC7EEFAA81BA7361978F5743B9MD5
395ae3dff0d88066b4773efa59cd4b12
SHA123571353cd5abe71b7f65b5593736b4fb62eeac8
SHA25675db73f772a12e2338ed647a30fd237a5ca8310bd960e67a339edbd5e64f8ab2
SHA512bd09737cabd59a6fae288e641f85916fd15af54316ee636b5b11c1be29ecf1ad7eb5b1c89e528f15fc7649f948331c0dcd82b415849ef273273fea92a7a50907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DF8D319B9741B9E1EBE906AACEA5CBBA_A2E0B287EC2147F84DD8A330B45D3489MD5
01324231a142239f16e67ac98054329b
SHA180f4b235b19fc744d77701456e8f0ce416dc5823
SHA256e4a7d0af3ce2634cd4872eb55ace9bfc78fe57e34cbe474e44b1f4e4dc47b13d
SHA512504e34f7ea9cb7a6eecd65a184fd4e83d93982e1821739f7cae8b9436e6bdfe5ad748dd7c69cedb289c30671fba7790b62da336e71c3d936a2a047dbdb042b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501MD5
86157f077209ff4e1608124d8865bbb5
SHA1c7b9253d6b2966c572963ca6a17103ed8923c527
SHA25660ba3fe1674608c8811008da78dca5af65ae7f17db5c2eabd7d018660d636224
SHA5129a381385464a8e4d6dbe446e145dbf77c945fbca13d0fd090b2ad9700a92ed2ec69f678ae338dc8bc0bbc2b48f7f2ce0ddb1070dcaf8ca17e2bfbf43281997b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_D21903E2722B551F252C717985D24037MD5
fa435d76f20d47bd2edac1b564183b94
SHA123c69fde5068c42a3472368881796af9402f455d
SHA256b096a1eededd5b5162bea7180ed8866a27a4b54f93ff3d194e1fc49f1684865d
SHA51241ba97ce9d5f9e5e2025a28fee9050d5c0dc3f8d73096de00f296d0339c62ea7a3d53d21660bff904ebf2b84e5f305bba912875ded704b7c0dd2c442352352dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDA81A73291E20E6ACF6CACA76D5C942_2A2080AC7EEFAA81BA7361978F5743B9MD5
6f2ba79892ba69c2e2ebe3af67466f6e
SHA190faf5ad9a4683c41b531c13aeef417e8a40958c
SHA2561fb7122b9aae96ebf2acbb28d8b017cf9c4529506316d8937d5aa4d07fed875b
SHA5124d9d763b75bac088146b5611fbcd2df52b01573db766d2eb62e7e56c7d1355c3e45d66af2af7b044420c60658d9849100de570b511a96d6bd1bed36798be991e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DF8D319B9741B9E1EBE906AACEA5CBBA_A2E0B287EC2147F84DD8A330B45D3489MD5
c40eecd7db8240afe1972ac063609fa7
SHA1a0950ea85338aa949a41ad559b6df0d0b43d052a
SHA256228e610b353ef99b5758a2e8a4b103167af2d1ddddeb42f39eecda732d7cb6cb
SHA512713f274faf1d0e7f5432b240bf7c6ea88634689bae1f4289f27a19a10c0f8e27326cd1132cad14ff594b7a7ec41853381211961f4d8011bdfd2415b1197228b4
-
C:\Users\Admin\AppData\Local\Temp\._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exeMD5
7109bb5c4a3ed977186f220d2fa0573e
SHA1c8a77426927e765ef8509fb10696c879819e8353
SHA2564de910d7ae4d9e6ef087bc585c324f9590291e45ca0a94e0c15491fc6a8153a2
SHA512a943144fe64863cab2b447338640b7a585de71df000fca0a3d4c3b569164e95bf14382f2bb50c3d4f118d82fde1f3099ca745fe961a43cdd4a06216f1df052e1
-
C:\Users\Admin\AppData\Local\Temp\._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exeMD5
7109bb5c4a3ed977186f220d2fa0573e
SHA1c8a77426927e765ef8509fb10696c879819e8353
SHA2564de910d7ae4d9e6ef087bc585c324f9590291e45ca0a94e0c15491fc6a8153a2
SHA512a943144fe64863cab2b447338640b7a585de71df000fca0a3d4c3b569164e95bf14382f2bb50c3d4f118d82fde1f3099ca745fe961a43cdd4a06216f1df052e1
-
C:\Users\Admin\AppData\Local\Temp\._cache_7433483273e783867f5cddf6c9648f18faaa566d7f266eaa48aaa964f0390b96.exeMD5
7109bb5c4a3ed977186f220d2fa0573e
SHA1c8a77426927e765ef8509fb10696c879819e8353
SHA2564de910d7ae4d9e6ef087bc585c324f9590291e45ca0a94e0c15491fc6a8153a2
SHA512a943144fe64863cab2b447338640b7a585de71df000fca0a3d4c3b569164e95bf14382f2bb50c3d4f118d82fde1f3099ca745fe961a43cdd4a06216f1df052e1
-
C:\Users\Admin\AppData\Local\Temp\0C731CE9-21AE-4127-839C-FAE369003C4D\lite_installer.exeMD5
3a02e5063012607da6d2e87f6eaace2a
SHA18663d75c8b67f0d88152c6da3e525eaad8c52e18
SHA256d6cd6c6b67a74405c85dee8839cc50b4e208c4b2fd20af676b402cb119637ce3
SHA5120aca5fdc0ba392a926ce8f93e2a900ed69cf627835b11e8ce63fe7ff83cea1167152f3de27e75a93153a73c47a04bf33f7df9d31217ce8b8cfb1fba3a93203a6
-
C:\Users\Admin\AppData\Local\Temp\6FCA9D6B-CB0E-45E5-8488-7E273AC746AB\sender.exeMD5
3622a481a75029c309940218af0eb232
SHA19c64e58619e64e9b30afa03433edf23a5f936a1a
SHA256b4caa54898bcb8d1e4bf424d1eed05e9d4c8e0cfa3f722a6628f700f6ff1492d
SHA5123edbbb09d5dab177c4fa42a8447ba1956a783b58dcb2a99d60b09fd260aa399efe71721dee15647156396de755a3fcba0821ee9caed84bb449a37aad5440d38b
-
C:\Users\Admin\AppData\Local\Temp\6FCA9D6B-CB0E-45E5-8488-7E273AC746AB\sender.exeMD5
3622a481a75029c309940218af0eb232
SHA19c64e58619e64e9b30afa03433edf23a5f936a1a
SHA256b4caa54898bcb8d1e4bf424d1eed05e9d4c8e0cfa3f722a6628f700f6ff1492d
SHA5123edbbb09d5dab177c4fa42a8447ba1956a783b58dcb2a99d60b09fd260aa399efe71721dee15647156396de755a3fcba0821ee9caed84bb449a37aad5440d38b
-
C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exeMD5
e3abbcda7bcb5417e7292a4babda2140
SHA119950a487927f4bee78775683e3c5e13c58135f8
SHA2568513ef1f1001080e8da0004f947058e833cd04fa29a898511992d87666b1b875
SHA512a419b0556fa92700d36bd10a3efac5fbe00496c394cf29b091d91cedcc7fc4cb503c7805c86ada9fb7a47a1c8a5c9c248287b98be0175bbf581460cae7ef3ba0
-
C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exeMD5
e3abbcda7bcb5417e7292a4babda2140
SHA119950a487927f4bee78775683e3c5e13c58135f8
SHA2568513ef1f1001080e8da0004f947058e833cd04fa29a898511992d87666b1b875
SHA512a419b0556fa92700d36bd10a3efac5fbe00496c394cf29b091d91cedcc7fc4cb503c7805c86ada9fb7a47a1c8a5c9c248287b98be0175bbf581460cae7ef3ba0
-
C:\Users\Admin\AppData\Local\Temp\CAF6A3A5-A45B-4C90-BCCB-6D0A9B4513EE\seederexe.exeMD5
1490f7dfcd766cce6d57be30950cc158
SHA1e8240d3ef72146276b53d056c1e41831962aa67f
SHA256417c45dc0e73eae14df419acddd751bf378b64ee5c8862053bf03c983676b210
SHA512a23bd3ad7f6e2fe3802c120c9399642f015f6ca8dc65e42aa23104c7e78199974054ef5a1e861349b20faa327dab1f2f78ce6034f34b131c5f67cd0b136e37ba
-
C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\setup.exeMD5
7931d5100242e6fc0ca3ff2dfe0f74fa
SHA13984301bcf28055a5f2619a1e4d1211b48916482
SHA256c512e108729bc8bd62fb56fd390e002864e939fde055b1ffb3b823e5c0a68b05
SHA512171d4e87411d6b55dff5035f808fc23eb3db76a5239008bfd64cfea7ab1528b9dbc3d894b65fe8988432ae440e259d29e1bcf72d978a00ea6e8220a378f9011c
-
C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\setup.exeMD5
7931d5100242e6fc0ca3ff2dfe0f74fa
SHA13984301bcf28055a5f2619a1e4d1211b48916482
SHA256c512e108729bc8bd62fb56fd390e002864e939fde055b1ffb3b823e5c0a68b05
SHA512171d4e87411d6b55dff5035f808fc23eb3db76a5239008bfd64cfea7ab1528b9dbc3d894b65fe8988432ae440e259d29e1bcf72d978a00ea6e8220a378f9011c
-
C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\setup.exeMD5
7931d5100242e6fc0ca3ff2dfe0f74fa
SHA13984301bcf28055a5f2619a1e4d1211b48916482
SHA256c512e108729bc8bd62fb56fd390e002864e939fde055b1ffb3b823e5c0a68b05
SHA512171d4e87411d6b55dff5035f808fc23eb3db76a5239008bfd64cfea7ab1528b9dbc3d894b65fe8988432ae440e259d29e1bcf72d978a00ea6e8220a378f9011c
-
C:\Users\Admin\AppData\Local\Temp\YB_ED637.tmp\setup.exeMD5
7931d5100242e6fc0ca3ff2dfe0f74fa
SHA13984301bcf28055a5f2619a1e4d1211b48916482
SHA256c512e108729bc8bd62fb56fd390e002864e939fde055b1ffb3b823e5c0a68b05
SHA512171d4e87411d6b55dff5035f808fc23eb3db76a5239008bfd64cfea7ab1528b9dbc3d894b65fe8988432ae440e259d29e1bcf72d978a00ea6e8220a378f9011c
-
C:\Users\Admin\AppData\Local\Temp\YandexSearch00000.logMD5
7be5203238eb664c9b7514c275a28fac
SHA1537052e773c16cbe8a4101da31e87745f2bda49f
SHA256587077aa11d5f68db6ea45494b84fd008729dc9c30c02ffc904935dbf6df7374
SHA5126d5323a925374695c7cb75fcc9044b7500b2ec131191c1b0dec98204fcb45ad6b12319a868cb674ddebdc00e3473a25f07f9da1a0514108b6c50efaa25c3c5dd
-
C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xmlMD5
c39f6f67fe148fc35043a3fadd91d9a4
SHA1b61329c6bd21b3f1a3a3446e5b1c25c4853ae781
SHA256886641aac075e73f5331e51b11b6b2b7caaa2ddcda8139bd3fcd9cee86f20248
SHA512af07c026bd5c1abf59a3928163078c2f109c1146ef8b92db5ef055b69788daeb516d43d0d10e9c91420c9ac1e9e883f49225e4bf7297efd983b20dc7f2fb8850
-
C:\Users\Admin\AppData\Local\Temp\master_preferencesMD5
ffb0c77c9d4d688259bb46f434e03eb5
SHA1acfd1629c554a423563851bdb97c141878ee5b43
SHA2564a9b4179a7d1bf7b50170180b68fe519ca751d10ff088d447b8924b2789c26b0
SHA5127d1f111308217999693c9d2fb9487f83e8c008cdc933cdfcd2c5475899e614eeb6fe13add1e6d7723e01e524dff37ebce6c6ca146454e24425cb4ae99e711536
-
C:\Users\Admin\AppData\Local\Temp\master_preferencesMD5
ffb0c77c9d4d688259bb46f434e03eb5
SHA1acfd1629c554a423563851bdb97c141878ee5b43
SHA2564a9b4179a7d1bf7b50170180b68fe519ca751d10ff088d447b8924b2789c26b0
SHA5127d1f111308217999693c9d2fb9487f83e8c008cdc933cdfcd2c5475899e614eeb6fe13add1e6d7723e01e524dff37ebce6c6ca146454e24425cb4ae99e711536
-
C:\Users\Admin\AppData\Local\Temp\pin\explorer.exeMD5
fa4a68bf3210f747a4bc077d29266f7e
SHA186ecbcc072c31e621f337248e6fe2eaf4b9e8a70
SHA256c68f2fb792c1fa5cd8656e856df54a17e669649e41ad86b50f6c2cc9deef505a
SHA512d1d440107eddd4e08336698f6608adfd512bf0d6134011350675e2cccee9a2b3cdfa989e3cf8c6a960ba246d69f334cd6042c9ab6be273bb69e65cdc61ab8d51
-
C:\Users\Admin\AppData\Local\Temp\tmp1800aaaaaaMD5
dc595f5eb36201c63a6fdfc8879954f3
SHA16ada0b82267bff0913e963939acf7e7fe6055d8c
SHA25609a59214fe30a096a5ec4209af46489cb27fe17c06cee6aaf0b98b17e1318505
SHA512678dc29481777e54f929d8b5e9d80deba794c138493b4a39c9481d35e3e813dcb3b07f0b085117cf16992a600c9d80fc2b285cb6b5e91ba194b5340b3bee932d
-
C:\Users\Admin\AppData\Local\Temp\yandex_browser_installer.logMD5
68867649b721efba9793098e143e0c11
SHA1b2c2ffe274c8d7de47a33a09dd2152d87df63984
SHA256207ddb03caad0e81053974a14ad01a5ebf2ae1e5969766d8677c6986053f2597
SHA51274b454296987ac202602431c5b5bee13b9fb3224a0e7152fc437bdfe6ff6afe3bb187e4aebfc79ed9c2a01a91b60b723a2dbb1948faa4ccea35e702b853b7a5c
-
C:\Users\Admin\AppData\Local\Temp\yb39B3.tmpMD5
b37ebe9372a528842ebf633bbf1a6987
SHA1175e7b8f50cba1c9f02d4f979343b4245b6e4ebc
SHA25606480ac95c5113d36086c3368a6fb433d5491fa3ad76f87aa2ed66a2b47fbb83
SHA512d7eae59deb555118859d97164bc1f44a54fba0c3fdb4c3a838c44dff6730043cdab6340d725aef999f17ed05ca4509fee3923f78d38d5269e584d68fe02557b1
-
C:\Users\Admin\AppData\Local\Temp\{46C0611B-BD1A-4850-A713-B9428CEF362F}.exeMD5
97ebc29e51f4383714028319a7e14b3d
SHA152225704ad8a77342f4e5ae26acc9dc974b1b663
SHA256e9847cf182b6ac4e0f5ca6148ad7c6ca87b07f850eec652cda638a55ea33a2b7
SHA512ee882571976c0031e420b4e766f7d29972cee099883a88fd52c8bfeba4e27033fa8823e63958037f50ae4a28f2839fbf4e58ede6b0d2ab7e226258f56c43be8f
-
C:\Users\Admin\AppData\Local\Temp\{46C0611B-BD1A-4850-A713-B9428CEF362F}.exeMD5
97ebc29e51f4383714028319a7e14b3d
SHA152225704ad8a77342f4e5ae26acc9dc974b1b663
SHA256e9847cf182b6ac4e0f5ca6148ad7c6ca87b07f850eec652cda638a55ea33a2b7
SHA512ee882571976c0031e420b4e766f7d29972cee099883a88fd52c8bfeba4e27033fa8823e63958037f50ae4a28f2839fbf4e58ede6b0d2ab7e226258f56c43be8f
-
C:\Users\Admin\AppData\Local\Temp\{5B964E0E-B9A3-4276-9ED9-4D5A5720747A}\YandexSearch.msiMD5
98749718959eea953136dc47f4d2d111
SHA176e1cf2dd17a09dc09808d086016a46c2656aaf6
SHA256bd153b3e95f3db3fb4c6494f048c4fa3debeba80d96374ceadaddc03c354c1ce
SHA512e5504777834c27fc0ad00ab7d35b810f4af09d97e93fd66edf6cabb71a8843ba4f19647344a856dbcc346b0382b94468ceb60db4d0041b4ebdae74f1a6334a7b
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeMD5
fa4a68bf3210f747a4bc077d29266f7e
SHA186ecbcc072c31e621f337248e6fe2eaf4b9e8a70
SHA256c68f2fb792c1fa5cd8656e856df54a17e669649e41ad86b50f6c2cc9deef505a
SHA512d1d440107eddd4e08336698f6608adfd512bf0d6134011350675e2cccee9a2b3cdfa989e3cf8c6a960ba246d69f334cd6042c9ab6be273bb69e65cdc61ab8d51
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeMD5
fa4a68bf3210f747a4bc077d29266f7e
SHA186ecbcc072c31e621f337248e6fe2eaf4b9e8a70
SHA256c68f2fb792c1fa5cd8656e856df54a17e669649e41ad86b50f6c2cc9deef505a
SHA512d1d440107eddd4e08336698f6608adfd512bf0d6134011350675e2cccee9a2b3cdfa989e3cf8c6a960ba246d69f334cd6042c9ab6be273bb69e65cdc61ab8d51
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.lnkMD5
268b0ad2b555da42ad37ea5fb05255dd
SHA159c051533e7d2a1ea1f10cefe6408a1633a5d8f4
SHA2565679b8d055dd57805373b01d77cd727e717ea80bbf05a2695ef678b182e57013
SHA512d3346b49298ce4783d5149e918bda3c61d7bbe9467c7a2fc87c17aeba32547e3a58157c4dbb133343a8510404b8081f69ae60c27ba5cab0535fa45c19617a6d3
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad\settings.datMD5
73c24d043acafc7b4e81cdc14b0c88d1
SHA1bb5bc67fde23b4b6732955a62f35b4f1bbc4fa73
SHA256e7a51fb11e5e5d0659f278c13c39db0015cc97d3fae2f2136a7048e8e35b382b
SHA51270c45b2a41111902e3b0b8c4691a6b7000a007494623f2138412a59eb2cd1483a13e6f123f797aa9682503970462d008f18a72622770e04080cc910c531e4e6e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Яндекс.websiteMD5
450a0e55609d098d2ea2b925cacadc69
SHA1f61417be427d11d8afba5cdfd54fe592591714b9
SHA256243faedb5afcb7c6b55536c770d2a679ac1f2ef3e5304c6c052d60742333b438
SHA512340b02469d463905cca59b275bf4010bf5c27ec517470ab8747a9b409848551deb35a41def12f4748b8272a1453cbd60bfedd871214f4d13f4804f7406348b71
-
C:\Users\Admin\AppData\Roaming\Yandex\clids-yabrowser.xmlMD5
7922c3eba961f32b3040c5d059dd8fd9
SHA1ef17dd30c68cc810c6b785318eba06c9f8d009da
SHA2569929509cfd22af01e022b9b288ad68a8274fdafcd8b9f289ce61bec1e86718e0
SHA5120cd0a169a6f399d58b710bfdcdaffc0f451b99653481b12b9d1c017cc16837e36eb7cd394197d1e00b1669a38040ccf3017985fdf85c9d3213eec8979d72c827
-
C:\Users\Admin\AppData\Roaming\Yandex\uiMD5
e226d02b1e4e2a0f70b7f14d6e8e8c0b
SHA1e58fdc424741308133c247f81df14061dbd6bacd
SHA2566b07f77ab745bcb019834dbf367cf5e311d4fb3405b3f3d23b3d645864a64f1d
SHA512dd2d761fa27f769b00aa2e443214d67e777133138c0d50a58825119622a505d54b2ddd1316b0fde91e5af9270e4e5720587825fb9fba3b8fee5f0c671de5ba92
-
C:\Windows\Installer\MSI2D30.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
C:\Windows\Installer\MSI2E4A.tmpMD5
77f6c8cd91fb34aaf8d4d75c5859b271
SHA198d30af33076335c3bedadd589d74e4d17e80788
SHA25674ff162259c58073005e66ba20f6e390112453a1e389330c614f56ff6e265b54
SHA51220cac8e67ba0f0a3d9f3b92abfab43fd8eeb0a9ffad3da02d6d6ada97253a137922a92f53485772b4a4d2673b9f643abb3b6407a4d397c9c1d8638f1636ac457
-
C:\Windows\Installer\MSI2E99.tmpMD5
77f6c8cd91fb34aaf8d4d75c5859b271
SHA198d30af33076335c3bedadd589d74e4d17e80788
SHA25674ff162259c58073005e66ba20f6e390112453a1e389330c614f56ff6e265b54
SHA51220cac8e67ba0f0a3d9f3b92abfab43fd8eeb0a9ffad3da02d6d6ada97253a137922a92f53485772b4a4d2673b9f643abb3b6407a4d397c9c1d8638f1636ac457
-
C:\Windows\Installer\MSI2FF2.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
C:\Windows\Installer\MSI3041.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
C:\Windows\Installer\MSI3090.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
C:\Windows\Installer\MSI30D0.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
C:\Windows\Installer\MSI315D.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
C:\Windows\Installer\MSI322A.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
C:\Windows\Installer\MSI32B7.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
\Windows\Installer\MSI2D30.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
\Windows\Installer\MSI2E4A.tmpMD5
77f6c8cd91fb34aaf8d4d75c5859b271
SHA198d30af33076335c3bedadd589d74e4d17e80788
SHA25674ff162259c58073005e66ba20f6e390112453a1e389330c614f56ff6e265b54
SHA51220cac8e67ba0f0a3d9f3b92abfab43fd8eeb0a9ffad3da02d6d6ada97253a137922a92f53485772b4a4d2673b9f643abb3b6407a4d397c9c1d8638f1636ac457
-
\Windows\Installer\MSI2E99.tmpMD5
77f6c8cd91fb34aaf8d4d75c5859b271
SHA198d30af33076335c3bedadd589d74e4d17e80788
SHA25674ff162259c58073005e66ba20f6e390112453a1e389330c614f56ff6e265b54
SHA51220cac8e67ba0f0a3d9f3b92abfab43fd8eeb0a9ffad3da02d6d6ada97253a137922a92f53485772b4a4d2673b9f643abb3b6407a4d397c9c1d8638f1636ac457
-
\Windows\Installer\MSI2FF2.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
\Windows\Installer\MSI3041.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
\Windows\Installer\MSI3090.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
\Windows\Installer\MSI30D0.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
\Windows\Installer\MSI315D.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
\Windows\Installer\MSI322A.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
\Windows\Installer\MSI32B7.tmpMD5
f6ee185930e588161964f5dbb752ffbd
SHA10c41195bd91b90d3a581852b6315991f7fd54c52
SHA256a821faa27ba5df16fdfcab152737b641dc759f306dfdd682a28c61f5ee6b16fb
SHA512a752fb1f1d9637e2f83b4fdd27c69ffccdbda6cdd42723906f60ffd17e9801297e850edaa3a47a6a5a5e188cb0aa7ea97eb4d1f577e002c052d871271dc8b8d6
-
memory/740-230-0x0000000000000000-mapping.dmp
-
memory/1116-283-0x0000000000000000-mapping.dmp
-
memory/1216-285-0x0000000000000000-mapping.dmp
-
memory/1604-150-0x0000000000000000-mapping.dmp
-
memory/1784-174-0x0000000000000000-mapping.dmp
-
memory/1800-157-0x0000000000000000-mapping.dmp
-
memory/1808-229-0x0000000000000000-mapping.dmp
-
memory/1864-135-0x0000000000000000-mapping.dmp
-
memory/2020-115-0x0000000000000000-mapping.dmp
-
memory/2104-122-0x0000000000000000-mapping.dmp
-
memory/2204-170-0x0000000000000000-mapping.dmp
-
memory/2240-272-0x0000000000000000-mapping.dmp
-
memory/2240-268-0x00000000775B2000-0x00000000775B200C-memory.dmpFilesize
12B
-
memory/2488-121-0x0000000000550000-0x0000000000551000-memory.dmpFilesize
4KB
-
memory/2488-118-0x0000000000000000-mapping.dmp
-
memory/2568-287-0x0000000000000000-mapping.dmp
-
memory/2680-114-0x0000000000500000-0x000000000064A000-memory.dmpFilesize
1.3MB
-
memory/3472-262-0x00000000775B2000-0x00000000775B200C-memory.dmpFilesize
12B
-
memory/3472-266-0x0000000000000000-mapping.dmp
-
memory/3516-282-0x0000000000000000-mapping.dmp
-
memory/3688-280-0x0000000000000000-mapping.dmp
-
memory/3952-124-0x0000000000000000-mapping.dmp
-
memory/4112-286-0x0000000000000000-mapping.dmp
-
memory/4116-261-0x0000000000000000-mapping.dmp
-
memory/4116-258-0x00000000775B2000-0x00000000775B200C-memory.dmpFilesize
12B
-
memory/4120-177-0x0000000000000000-mapping.dmp
-
memory/4316-184-0x0000000000000000-mapping.dmp
-
memory/4328-241-0x0000000000000000-mapping.dmp
-
memory/4328-254-0x0000029942EB0000-0x0000029942EB1000-memory.dmpFilesize
4KB
-
memory/4344-188-0x0000000000000000-mapping.dmp
-
memory/4364-233-0x0000000000000000-mapping.dmp
-
memory/4392-281-0x0000000000000000-mapping.dmp
-
memory/4404-194-0x0000000000000000-mapping.dmp
-
memory/4444-200-0x0000000000000000-mapping.dmp
-
memory/4464-238-0x0000000000000000-mapping.dmp
-
memory/4492-279-0x0000000000000000-mapping.dmp
-
memory/4496-277-0x0000000000000000-mapping.dmp
-
memory/4496-274-0x00000000775B2000-0x00000000775B200C-memory.dmpFilesize
12B
-
memory/4536-205-0x0000000000000000-mapping.dmp
-
memory/4588-208-0x0000000000000000-mapping.dmp
-
memory/4600-242-0x0000000000000000-mapping.dmp
-
memory/4644-213-0x0000000000000000-mapping.dmp
-
memory/4700-216-0x0000000000000000-mapping.dmp
-
memory/4736-219-0x0000000000000000-mapping.dmp
-
memory/4764-243-0x00000000775B2000-0x00000000775B200C-memory.dmpFilesize
12B
-
memory/4764-245-0x0000000000000000-mapping.dmp
-
memory/4764-222-0x0000000000000000-mapping.dmp
-
memory/4832-225-0x0000000000000000-mapping.dmp
-
memory/4880-226-0x0000000000000000-mapping.dmp
-
memory/4892-246-0x0000000000000000-mapping.dmp
-
memory/4928-227-0x0000000000000000-mapping.dmp
-
memory/4968-284-0x0000000000000000-mapping.dmp
-
memory/4976-228-0x0000000000000000-mapping.dmp
-
memory/5020-255-0x0000000000000000-mapping.dmp
-
memory/5020-252-0x00000000775B2000-0x00000000775B200C-memory.dmpFilesize
12B
-
memory/5124-288-0x0000000000000000-mapping.dmp
-
memory/5192-289-0x0000000000000000-mapping.dmp
-
memory/5224-290-0x0000000000000000-mapping.dmp
-
memory/5292-291-0x0000000000000000-mapping.dmp
-
memory/5316-292-0x0000000000000000-mapping.dmp
-
memory/5352-293-0x0000000000000000-mapping.dmp
-
memory/5412-294-0x0000000000000000-mapping.dmp
-
memory/5452-295-0x0000000000000000-mapping.dmp
-
memory/5472-296-0x0000000000000000-mapping.dmp
-
memory/5524-297-0x0000000000000000-mapping.dmp
-
memory/5564-298-0x0000000000000000-mapping.dmp
-
memory/5616-299-0x0000000000000000-mapping.dmp
-
memory/5652-300-0x0000000000000000-mapping.dmp
-
memory/5692-301-0x0000000000000000-mapping.dmp
-
memory/5732-302-0x0000000000000000-mapping.dmp
-
memory/5776-303-0x0000000000000000-mapping.dmp
-
memory/5808-304-0x0000000000000000-mapping.dmp
-
memory/5824-305-0x0000000000000000-mapping.dmp