Resubmissions
17-10-2022 19:36
221017-ybkpeacgf7 1017-10-2022 17:27
221017-v1ye1scfdl 817-10-2022 14:10
221017-rg6qhacbgq 8Analysis
-
max time kernel
1800s -
max time network
1802s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2022 14:10
Static task
static1
Behavioral task
behavioral1
Sample
Yandex.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Yandex.exe
Resource
win10-20220812-en
General
-
Target
Yandex.exe
-
Size
2.4MB
-
MD5
09bb3df23630c9111a5860cb96bde6ad
-
SHA1
217d78e392e7ef295596862175eb353977a85738
-
SHA256
e36891d982acaa5b12e27cf55fae3581e29dd0ef35d0dd98ae93296034b5177e
-
SHA512
8a216eac67b5d4bc54781a166cd48ab8a68e0b983fb346c14030eca060046fe7484f76fa4eb006164c5781684cad82f7d29afaf9514e70c81feffe70df402f31
-
SSDEEP
49152:CsEpJsMKSCZrcPEGuW9Q+iA5H5u8QeuL:CsEpuBZrcPEGuWMxt
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
yb7498.tmpsetup.exesetup.exesetup.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeexplorer.exeexplorer.exeYandex.exeexplorer.execlidmgr.execlidmgr.execlidmgr.execlidmgr.exeSEARCHBAND.EXEsearchbandapp.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exesetup.exebrowser.exesetup.exebrowser.exebrowser.exebrowser.exesearchbandapp64.exebrowser.exebrowser.exebrowser.execrashreporter64.exebrowser_diagnostics.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 2304 yb7498.tmp 3460 setup.exe 4868 setup.exe 3624 setup.exe 2164 service_update.exe 1676 service_update.exe 4992 service_update.exe 4280 service_update.exe 4416 service_update.exe 5028 service_update.exe 4488 service_update.exe 1116 explorer.exe 2248 explorer.exe 4568 Yandex.exe 4336 explorer.exe 628 clidmgr.exe 4692 clidmgr.exe 3436 clidmgr.exe 1840 clidmgr.exe 3688 SEARCHBAND.EXE 2264 searchbandapp.exe 4492 browser.exe 4408 browser.exe 2740 browser.exe 4972 browser.exe 4912 browser.exe 3064 browser.exe 4808 browser.exe 628 browser.exe 4712 setup.exe 4696 browser.exe 1560 setup.exe 988 browser.exe 4980 browser.exe 1136 browser.exe 3284 searchbandapp64.exe 2844 browser.exe 4208 browser.exe 4364 browser.exe 4456 crashreporter64.exe 5204 browser_diagnostics.exe 5240 browser.exe 5156 browser.exe 5364 browser.exe 5544 browser.exe 5616 browser.exe 5708 browser.exe 5724 browser.exe 5744 browser.exe 5804 browser.exe 5872 browser.exe 5936 browser.exe 5984 browser.exe 6048 browser.exe 6108 browser.exe 5248 browser.exe 4128 browser.exe 5380 browser.exe 2088 browser.exe 3500 browser.exe 5552 browser.exe 5624 browser.exe 5788 browser.exe 5896 browser.exe -
Checks computer location settings 2 TTPs 18 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
service_update.exesearchbandapp.exebrowser.exebrowser.exeYandex.exeexplorer.exebrowser.exeYandex.exebrowser.exebrowser.exebrowser.exebrowser.exesearchbandapp64.exesetup.exeexplorer.exebrowser.exebrowser.exebrowser.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation service_update.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation searchbandapp.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Yandex.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Yandex.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation searchbandapp64.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation browser.exe -
Loads dropped DLL 64 IoCs
Processes:
MsiExec.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exesearchbandapp64.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 4496 MsiExec.exe 4496 MsiExec.exe 4496 MsiExec.exe 4496 MsiExec.exe 4496 MsiExec.exe 4496 MsiExec.exe 4492 browser.exe 4408 browser.exe 4492 browser.exe 4492 browser.exe 2740 browser.exe 2740 browser.exe 4972 browser.exe 4972 browser.exe 2740 browser.exe 2740 browser.exe 2740 browser.exe 2740 browser.exe 2740 browser.exe 4912 browser.exe 4912 browser.exe 3064 browser.exe 3064 browser.exe 4808 browser.exe 4808 browser.exe 628 browser.exe 628 browser.exe 4696 browser.exe 4696 browser.exe 988 browser.exe 988 browser.exe 1136 browser.exe 4980 browser.exe 1136 browser.exe 4980 browser.exe 1136 browser.exe 2844 browser.exe 2844 browser.exe 4208 browser.exe 4208 browser.exe 4364 browser.exe 4364 browser.exe 3284 searchbandapp64.exe 2556 3284 searchbandapp64.exe 3284 searchbandapp64.exe 5240 browser.exe 5240 browser.exe 5156 browser.exe 5364 browser.exe 5364 browser.exe 5544 browser.exe 5544 browser.exe 5616 browser.exe 5616 browser.exe 5708 browser.exe 5708 browser.exe 5724 browser.exe 5724 browser.exe 5744 browser.exe 5744 browser.exe 5804 browser.exe 5804 browser.exe 5872 browser.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
browser.exesearchbandapp64.exesearchbandapp64.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YandexBrowserAutoLaunch_45886AE68CD319C7351FF54A1DBD4B87 = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --shutdown-if-not-closed-by-system-restart" browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YandexSearchBand = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\SearchBand\\Application\\5.0.0.1903\\searchbandapp64.exe\" /auto" searchbandapp64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YandexSearchBand = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\SearchBand\\Application\\5.5.0.1923\\searchbandapp64.exe\" /auto" searchbandapp64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
browser.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA browser.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Drops file in System32 directory 18 IoCs
Processes:
bct.exeservice_update.exeservice_update.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini bct.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Yandex\ui service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 service_update.exe File opened for modification C:\Windows\System32\GroupPolicy bct.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft service_update.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\_[1].js service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B service_update.exe -
Drops file in Program Files directory 3 IoCs
Processes:
service_update.exeservice_update.exedescription ioc process File opened for modification C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\debug.log service_update.exe File created C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe service_update.exe File opened for modification C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe service_update.exe -
Drops file in Windows directory 18 IoCs
Processes:
msiexec.exeservice_update.exebrowser.exeservice_update.exedescription ioc process File opened for modification C:\Windows\Installer\e57a623.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\e57a626.msi msiexec.exe File created C:\Windows\Tasks\Repairing Yandex Browser update service.job service_update.exe File opened for modification C:\Windows\Installer\MSIA9DD.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIAB08.tmp msiexec.exe File created C:\Windows\Tasks\Обновление Браузера Яндекс.job browser.exe File created C:\Windows\Tasks\Update for Yandex Browser.job service_update.exe File created C:\Windows\Installer\e57a623.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIA95F.tmp msiexec.exe File created C:\Windows\Tasks\System update for Yandex Browser.job service_update.exe File created C:\Windows\Installer\SourceHash{4D922459-6A2E-4E43-B7A1-86872A9078F3} msiexec.exe File opened for modification C:\Windows\Installer\MSIAC13.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAE27.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAE28.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAA1D.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
browser.exebrowser.exebrowser.exebrowser.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe -
Processes:
searchbandapp64.exesearchbandapp64.exesearchbandapp64.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL\searchbandapp64.exe = "1" searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\searchbandapp64.exe = "0" searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM\searchbandapp64.exe = "0" searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\searchbandapp64.exe = "11000" searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING\searchbandapp64.exe = "1" searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL\searchbandapp64.exe = "1" searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM\searchbandapp64.exe = "0" searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\searchbandapp64.exe = "0" searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING\searchbandapp64.exe = "1" searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\searchbandapp64.exe = "11000" searchbandapp64.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
service_update.exeservice_update.exebrowser.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Yandex\UICreated_SYSTEM = "1" service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" service_update.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133104967525406108" browser.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" service_update.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry browser.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Yandex service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing service_update.exe -
Modifies registry class 64 IoCs
Processes:
browser.exesetup.exesetup.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SystemFileAssociations\.jpg\shell\image_search browser.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexTIFF.WXVEMRSTIGYW5ZPQXNSLO4DCFE setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexSWF.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.crx\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.jpeg\OpenWithProgids\YandexJPEG.WXVEMRSTIGYW5ZPQXNSLO4DCFE setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexHTML.WXVEMRSTIGYW5ZPQXNSLO4DCFE\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-108" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.css\OpenWithProgids\YandexCSS.WXVEMRSTIGYW5ZPQXNSLO4DCFE setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\yabrowser\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexWEBM.WXVEMRSTIGYW5ZPQXNSLO4DCFE\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-132" setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexGIF.WXVEMRSTIGYW5ZPQXNSLO4DCFE\DefaultIcon setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexJPEG.WXVEMRSTIGYW5ZPQXNSLO4DCFE\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-109" setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexPNG.WXVEMRSTIGYW5ZPQXNSLO4DCFE setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexJS.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexWEBM.WXVEMRSTIGYW5ZPQXNSLO4DCFE\ = "Yandex Browser WEBM Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexJS.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexTXT.WXVEMRSTIGYW5ZPQXNSLO4DCFE\ = "Yandex Browser TXT Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexJPEG.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.webp setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SystemFileAssociations\.png browser.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SystemFileAssociations\.webp\shell browser.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SystemFileAssociations\.bmp\shell\image_search browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexFB2.WXVEMRSTIGYW5ZPQXNSLO4DCFE\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-122" setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexGIF.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexTIFF.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexINFE.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell\open setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexWEBM.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexWEBP.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexCRX.WXVEMRSTIGYW5ZPQXNSLO4DCFE\DefaultIcon setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexEPUB.WXVEMRSTIGYW5ZPQXNSLO4DCFE\ = "Yandex Browser EPUB Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.epub\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexHTML.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexCRX.WXVEMRSTIGYW5ZPQXNSLO4DCFE\ = "Yandex Browser CRX Document" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexHTML.WXVEMRSTIGYW5ZPQXNSLO4DCFE\ = "Yandex Browser HTML Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.js setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SystemFileAssociations\.webp\shell\image_search\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --image-search=\"%1\"" browser.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.pdf setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\yabrowser\shell\open\command setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\yabrowser\shell\ = "open" setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexFB2.WXVEMRSTIGYW5ZPQXNSLO4DCFE\DefaultIcon setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.tiff\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\yabrowser\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,0" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexINFE.WXVEMRSTIGYW5ZPQXNSLO4DCFE\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-135" setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexXML.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexCSS.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexXML.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.png setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexCRX.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.webp\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexCRX.WXVEMRSTIGYW5ZPQXNSLO4DCFE setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.jpg\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexCRX.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexHTML.WXVEMRSTIGYW5ZPQXNSLO4DCFE\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-108" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexPDF.WXVEMRSTIGYW5ZPQXNSLO4DCFE\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-112" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.js\OpenWithProgids\YandexJS.WXVEMRSTIGYW5ZPQXNSLO4DCFE setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SystemFileAssociations\.webp\shell\image_search\Icon = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,0" browser.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexJS.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell\open\command setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.xht\OpenWithProgids\YandexHTML.WXVEMRSTIGYW5ZPQXNSLO4DCFE setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexJPEG.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell\open setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.xml\OpenWithProgids\YandexXML.WXVEMRSTIGYW5ZPQXNSLO4DCFE setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\.webp\OpenWithProgids\YandexWEBP.WXVEMRSTIGYW5ZPQXNSLO4DCFE setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexCRX.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SystemFileAssociations\.tif\shell\image_search browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SystemFileAssociations\.tif\shell\image_search\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --image-search=\"%1\"" browser.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\YandexHTML.WXVEMRSTIGYW5ZPQXNSLO4DCFE\shell\open setup.exe -
Processes:
Yandex.exesetup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 Yandex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 0f0000000100000030000000c130bba37b8b350e89fd5ed76b4f78777feee220d3b9e729042bef6af46e8e4c1b252e32b3080c681bc9a8a1afdd0a3c0b000000010000004200000047006c006f00620061006c005300690067006e00200043006f006400650020005300690067006e0069006e006700200052006f006f007400200052003400350000006200000001000000200000007b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df8653000000010000001f000000301d301b060567810c010330123010060a2b0601040182373c0101030200c01400000001000000140000001f00bf46800afc7839b7a5b443d95650bbce963b1d00000001000000100000005467b0adde8d858e30ee517b1a19ecd909000000010000000c000000300a06082b060105050703030300000001000000140000004efc31460c619ecae59c1bce2c008036d94c84b8200000000100000076050000308205723082035aa00302010202107653feac75464893f5e5d74a483a4ef8300d06092a864886f70d01010c05003053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f7420523435301e170d3230303331383030303030305a170d3435303331383030303030305a3053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f742052343530820222300d06092a864886f70d01010105000382020f003082020a0282020100b62dc530dd7ae8ab903d0372b03a4b991661b2e5ffa5671d371ce57eec9383aa84f5a3439b98458ab863575d9b00880425e9f868924b82d84bc94a03f3a87f6a8f8a6127bda144d0fdf53f22c2a34f918db305b22882915dfb5988050b9706c298f82ca73324ee503a41ccf0a0b07b1d4dd2a8583896e9dff91b91bb8b102cd2c7431da20974a180af7be6330a0c596b8ebcf4ab5a977b7fae55fb84f080fe844cd7e2babdc475a16fbd61107444b29807e274abff68dc6c263ee91fe5e00487ad30d30c8d037c55b816705c24782025eb676788abba4e34986b7011de38cad4bea1c09ce1df1e0201d83be1674384b6cffc74b72f84a3bfba09373d676cb1455c1961ab4183f5ac1deb770d464773cebfbd9595ed9d2b8810fefa58e8a757e1b3cfa85ae907259b12c49e80723d93dc8c94df3b44e62680fcd2c303f08c0cd245d62ee78f989ee604ee426e677e42167162e704f960c664a1b69c81214e2bc66d689486c699747367317a91f2d48c796e7ca6bb7e466f4dc585122bcf9a224408a88537ce07615706171224c0c43173a1983557477e103a45d92da4519098a9a00737c4651aaa1c6b1677f7a797ec3f1930996f31fbea40b2e7d2c4fac9d0f050767459fa8d6d1732bef8e97e03f4e787759ad44a912c850313022b4280f2896a36cfc84ca0ce9ef8cb8dad16a7d3ded59b18a7c6923af18263f12e0e2464df0203010001a3423040300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e041604141f00bf46800afc7839b7a5b443d95650bbce963b300d06092a864886f70d01010c050003820201005e2bba749734445f764828408493ee016ee9a1b3d68025e67be4bc09913d0ffc76add7d43020bb8f60d091d61cf29cef781a2b943202c12496525202d0f3d1fcf29b396e99e11f8e43417d9a1e5bc95d9a84fc26e687f3747226ada41bd93d3b6a52a03c091e2f1e7bb333b445c7f7acb1af9360ad76aeb8b21578eb836aebffdb46ab24e5ee02fa901f59c02f5dd6b75da45c10b77253f8414eccfa781a254acafe85624361c3b437aa81d2f4d63a0fbd8d597e3047de2b6be72150335fd4679bd4b8679f3c279903ff85438e7312ca20cde861d5b166dc17d6396d0fdbcf2337a182894e1c6b3fd6a0cdaa079d3e4226aad70ceefa47bf1a527ed17581d3c98a62176d4f88a021a0263eaf6dd962301fe99828ae6e8dd58e4c726693808d2ae355c760679042565c22510fb3dc4e39ee4dddd91d7810543b6ed0976f03b51eb22373c612b29a64d0fc958524a8ffdfa1b0dc9140aedf0933abb9dd92b7f1cc91743b69eb67971b90bfe7c7a06f71bb57bfb78f5aed7a406a16cd80842d2fe102d4249443b315fc0c2b1bfd716ffccbbc75173a5e83d2c9b32f1bd59c8d7f54fe7e7ee456a387a79de1595294418f6d5bbe86959aff1a76dd40d2514a70b41f336323773fec271e59e40887ed34824a0f3ffea01dc1f56773458678f4aa29e92787c619dbc61314c33949874da097e06513f59d7756e9dab358c73af2c0cd82 Yandex.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 Yandex.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
setup.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeexplorer.exeSEARCHBAND.EXEmsiexec.exesearchbandapp.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exesetup.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 4868 setup.exe 4868 setup.exe 2164 service_update.exe 2164 service_update.exe 1676 service_update.exe 1676 service_update.exe 4992 service_update.exe 4992 service_update.exe 4992 service_update.exe 4992 service_update.exe 4416 service_update.exe 4416 service_update.exe 5028 service_update.exe 5028 service_update.exe 4488 service_update.exe 4488 service_update.exe 1116 explorer.exe 1116 explorer.exe 1116 explorer.exe 1116 explorer.exe 4868 setup.exe 4868 setup.exe 3688 SEARCHBAND.EXE 3688 SEARCHBAND.EXE 4132 msiexec.exe 4132 msiexec.exe 2264 searchbandapp.exe 2264 searchbandapp.exe 4868 setup.exe 4868 setup.exe 4492 browser.exe 4492 browser.exe 2740 browser.exe 4972 browser.exe 4972 browser.exe 4912 browser.exe 3064 browser.exe 4808 browser.exe 4808 browser.exe 628 browser.exe 4696 browser.exe 4712 setup.exe 4712 setup.exe 4492 browser.exe 4492 browser.exe 988 browser.exe 1136 browser.exe 1136 browser.exe 4980 browser.exe 2844 browser.exe 4208 browser.exe 4364 browser.exe 5240 browser.exe 5364 browser.exe 5544 browser.exe 5544 browser.exe 5616 browser.exe 5708 browser.exe 5724 browser.exe 5744 browser.exe 5804 browser.exe 5872 browser.exe 5936 browser.exe 5984 browser.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
SEARCHBAND.EXEmsiexec.exedescription pid process Token: SeShutdownPrivilege 3688 SEARCHBAND.EXE Token: SeIncreaseQuotaPrivilege 3688 SEARCHBAND.EXE Token: SeSecurityPrivilege 4132 msiexec.exe Token: SeCreateTokenPrivilege 3688 SEARCHBAND.EXE Token: SeAssignPrimaryTokenPrivilege 3688 SEARCHBAND.EXE Token: SeLockMemoryPrivilege 3688 SEARCHBAND.EXE Token: SeIncreaseQuotaPrivilege 3688 SEARCHBAND.EXE Token: SeMachineAccountPrivilege 3688 SEARCHBAND.EXE Token: SeTcbPrivilege 3688 SEARCHBAND.EXE Token: SeSecurityPrivilege 3688 SEARCHBAND.EXE Token: SeTakeOwnershipPrivilege 3688 SEARCHBAND.EXE Token: SeLoadDriverPrivilege 3688 SEARCHBAND.EXE Token: SeSystemProfilePrivilege 3688 SEARCHBAND.EXE Token: SeSystemtimePrivilege 3688 SEARCHBAND.EXE Token: SeProfSingleProcessPrivilege 3688 SEARCHBAND.EXE Token: SeIncBasePriorityPrivilege 3688 SEARCHBAND.EXE Token: SeCreatePagefilePrivilege 3688 SEARCHBAND.EXE Token: SeCreatePermanentPrivilege 3688 SEARCHBAND.EXE Token: SeBackupPrivilege 3688 SEARCHBAND.EXE Token: SeRestorePrivilege 3688 SEARCHBAND.EXE Token: SeShutdownPrivilege 3688 SEARCHBAND.EXE Token: SeDebugPrivilege 3688 SEARCHBAND.EXE Token: SeAuditPrivilege 3688 SEARCHBAND.EXE Token: SeSystemEnvironmentPrivilege 3688 SEARCHBAND.EXE Token: SeChangeNotifyPrivilege 3688 SEARCHBAND.EXE Token: SeRemoteShutdownPrivilege 3688 SEARCHBAND.EXE Token: SeUndockPrivilege 3688 SEARCHBAND.EXE Token: SeSyncAgentPrivilege 3688 SEARCHBAND.EXE Token: SeEnableDelegationPrivilege 3688 SEARCHBAND.EXE Token: SeManageVolumePrivilege 3688 SEARCHBAND.EXE Token: SeImpersonatePrivilege 3688 SEARCHBAND.EXE Token: SeCreateGlobalPrivilege 3688 SEARCHBAND.EXE Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe Token: SeRestorePrivilege 4132 msiexec.exe Token: SeTakeOwnershipPrivilege 4132 msiexec.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
Processes:
Yandex.exeexplorer.exeexplorer.exebrowser.exesearchbandapp.exesearchbandapp64.exesearchbandapp64.exesearchbandapp64.exepid process 2084 Yandex.exe 1116 explorer.exe 4336 explorer.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 2264 searchbandapp.exe 2264 searchbandapp.exe 2264 searchbandapp.exe 3284 searchbandapp64.exe 3284 searchbandapp64.exe 3284 searchbandapp64.exe 3284 searchbandapp64.exe 3284 searchbandapp64.exe 3284 searchbandapp64.exe 3284 searchbandapp64.exe 1740 searchbandapp64.exe 5180 searchbandapp64.exe 5180 searchbandapp64.exe 5180 searchbandapp64.exe 5180 searchbandapp64.exe 5180 searchbandapp64.exe 5180 searchbandapp64.exe 5180 searchbandapp64.exe -
Suspicious use of SendNotifyMessage 47 IoCs
Processes:
browser.exesearchbandapp.exesearchbandapp64.exesearchbandapp64.exesearchbandapp64.exepid process 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 4492 browser.exe 2264 searchbandapp.exe 2264 searchbandapp.exe 3284 searchbandapp64.exe 3284 searchbandapp64.exe 3284 searchbandapp64.exe 3284 searchbandapp64.exe 3284 searchbandapp64.exe 3284 searchbandapp64.exe 1740 searchbandapp64.exe 5180 searchbandapp64.exe 5180 searchbandapp64.exe 5180 searchbandapp64.exe 5180 searchbandapp64.exe 5180 searchbandapp64.exe 5180 searchbandapp64.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
Yandex.exebrowser.exesearchbandapp64.exesearchbandapp64.exepid process 2084 Yandex.exe 4492 browser.exe 3284 searchbandapp64.exe 3284 searchbandapp64.exe 5180 searchbandapp64.exe 5180 searchbandapp64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Yandex.exeYandex.exeyb7498.tmpsetup.exesetup.exeservice_update.exeservice_update.exeservice_update.exeexplorer.exeYandex.exemsiexec.exebrowser.exedescription pid process target process PID 2084 wrote to memory of 1876 2084 Yandex.exe Yandex.exe PID 2084 wrote to memory of 1876 2084 Yandex.exe Yandex.exe PID 2084 wrote to memory of 1876 2084 Yandex.exe Yandex.exe PID 1876 wrote to memory of 2304 1876 Yandex.exe yb7498.tmp PID 1876 wrote to memory of 2304 1876 Yandex.exe yb7498.tmp PID 1876 wrote to memory of 2304 1876 Yandex.exe yb7498.tmp PID 2304 wrote to memory of 3460 2304 yb7498.tmp setup.exe PID 2304 wrote to memory of 3460 2304 yb7498.tmp setup.exe PID 2304 wrote to memory of 3460 2304 yb7498.tmp setup.exe PID 3460 wrote to memory of 4868 3460 setup.exe setup.exe PID 3460 wrote to memory of 4868 3460 setup.exe setup.exe PID 3460 wrote to memory of 4868 3460 setup.exe setup.exe PID 4868 wrote to memory of 3624 4868 setup.exe setup.exe PID 4868 wrote to memory of 3624 4868 setup.exe setup.exe PID 4868 wrote to memory of 3624 4868 setup.exe setup.exe PID 4868 wrote to memory of 2164 4868 setup.exe service_update.exe PID 4868 wrote to memory of 2164 4868 setup.exe service_update.exe PID 4868 wrote to memory of 2164 4868 setup.exe service_update.exe PID 2164 wrote to memory of 1676 2164 service_update.exe service_update.exe PID 2164 wrote to memory of 1676 2164 service_update.exe service_update.exe PID 2164 wrote to memory of 1676 2164 service_update.exe service_update.exe PID 4992 wrote to memory of 4280 4992 service_update.exe service_update.exe PID 4992 wrote to memory of 4280 4992 service_update.exe service_update.exe PID 4992 wrote to memory of 4280 4992 service_update.exe service_update.exe PID 4992 wrote to memory of 4416 4992 service_update.exe service_update.exe PID 4992 wrote to memory of 4416 4992 service_update.exe service_update.exe PID 4992 wrote to memory of 4416 4992 service_update.exe service_update.exe PID 4416 wrote to memory of 5028 4416 service_update.exe service_update.exe PID 4416 wrote to memory of 5028 4416 service_update.exe service_update.exe PID 4416 wrote to memory of 5028 4416 service_update.exe service_update.exe PID 4992 wrote to memory of 4488 4992 service_update.exe service_update.exe PID 4992 wrote to memory of 4488 4992 service_update.exe service_update.exe PID 4992 wrote to memory of 4488 4992 service_update.exe service_update.exe PID 4868 wrote to memory of 1116 4868 setup.exe explorer.exe PID 4868 wrote to memory of 1116 4868 setup.exe explorer.exe PID 4868 wrote to memory of 1116 4868 setup.exe explorer.exe PID 1116 wrote to memory of 2248 1116 explorer.exe explorer.exe PID 1116 wrote to memory of 2248 1116 explorer.exe explorer.exe PID 1116 wrote to memory of 2248 1116 explorer.exe explorer.exe PID 4868 wrote to memory of 4568 4868 setup.exe Yandex.exe PID 4868 wrote to memory of 4568 4868 setup.exe Yandex.exe PID 4868 wrote to memory of 4568 4868 setup.exe Yandex.exe PID 4568 wrote to memory of 4336 4568 Yandex.exe explorer.exe PID 4568 wrote to memory of 4336 4568 Yandex.exe explorer.exe PID 4568 wrote to memory of 4336 4568 Yandex.exe explorer.exe PID 4868 wrote to memory of 628 4868 setup.exe clidmgr.exe PID 4868 wrote to memory of 628 4868 setup.exe clidmgr.exe PID 4868 wrote to memory of 628 4868 setup.exe clidmgr.exe PID 4868 wrote to memory of 4692 4868 setup.exe clidmgr.exe PID 4868 wrote to memory of 4692 4868 setup.exe clidmgr.exe PID 4868 wrote to memory of 4692 4868 setup.exe clidmgr.exe PID 4868 wrote to memory of 3436 4868 setup.exe clidmgr.exe PID 4868 wrote to memory of 3436 4868 setup.exe clidmgr.exe PID 4868 wrote to memory of 3436 4868 setup.exe clidmgr.exe PID 4868 wrote to memory of 1840 4868 setup.exe clidmgr.exe PID 4868 wrote to memory of 1840 4868 setup.exe clidmgr.exe PID 4868 wrote to memory of 1840 4868 setup.exe clidmgr.exe PID 4868 wrote to memory of 3688 4868 setup.exe SEARCHBAND.EXE PID 4868 wrote to memory of 3688 4868 setup.exe SEARCHBAND.EXE PID 4868 wrote to memory of 3688 4868 setup.exe SEARCHBAND.EXE PID 4132 wrote to memory of 4496 4132 msiexec.exe MsiExec.exe PID 4132 wrote to memory of 4496 4132 msiexec.exe MsiExec.exe PID 4132 wrote to memory of 4496 4132 msiexec.exe MsiExec.exe PID 4492 wrote to memory of 4408 4492 browser.exe browser.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Yandex.exe"C:\Users\Admin\AppData\Local\Temp\Yandex.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Yandex.exe"C:\Users\Admin\AppData\Local\Temp\Yandex.exe" --parent-installer-process-id=2084 --run-as-admin --setup-cmd-line="fake_browser_arc --abt-config-resource-file=\"C:\Users\Admin\AppData\Local\Temp\abt_config_resource\" --abt-update-path=\"C:\Users\Admin\AppData\Local\Temp\25987f12-adc5-4ed1-b647-e7a321eb628d.tmp\" --brand-name=yandex --create-alice-shortcut-in-taskbar --distr-info-file=\"C:\Users\Admin\AppData\Local\Temp\distrib_info\" --make-browser-default-after-import --ok-button-pressed-time=420131664 --progress-window=459186 --send-statistics --the-interface-availability=190411288 --variations-update-path=\"C:\Users\Admin\AppData\Local\Temp\8c46e0ce-0349-4801-9ab4-33a6e3e452e5.tmp\" --verbose-logging"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\yb7498.tmp"C:\Users\Admin\AppData\Local\Temp\yb7498.tmp" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\25987f12-adc5-4ed1-b647-e7a321eb628d.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --create-alice-shortcut-in-taskbar --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=41 --install-start-time-no-uac=420866058 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --ok-button-pressed-time=420131664 --progress-window=459186 --send-statistics --source=lite --the-interface-availability=190411288 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\8c46e0ce-0349-4801-9ab4-33a6e3e452e5.tmp" --verbose-logging3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\BROWSER.PACKED.7Z" --searchband-file="C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\SEARCHBAND.EXE" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\25987f12-adc5-4ed1-b647-e7a321eb628d.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --create-alice-shortcut-in-taskbar --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=41 --install-start-time-no-uac=420866058 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --ok-button-pressed-time=420131664 --progress-window=459186 --send-statistics --source=lite --the-interface-availability=190411288 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\8c46e0ce-0349-4801-9ab4-33a6e3e452e5.tmp" --verbose-logging4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\BROWSER.PACKED.7Z" --searchband-file="C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\SEARCHBAND.EXE" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\25987f12-adc5-4ed1-b647-e7a321eb628d.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --create-alice-shortcut-in-taskbar --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=41 --install-start-time-no-uac=420866058 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --ok-button-pressed-time=420131664 --progress-window=459186 --send-statistics --source=lite --the-interface-availability=190411288 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\8c46e0ce-0349-4801-9ab4-33a6e3e452e5.tmp" --verbose-logging --verbose-logging --run-as-admin --target-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application" --child-setup-process --restart-as-admin-time=4469908425⤵
- Executes dropped EXE
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=4868 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x338,0x33c,0x340,0x334,0x344,0x9221d8,0x9221e8,0x9221f46⤵
- Executes dropped EXE
-
C:\Windows\TEMP\sdwra_4868_1942489870\service_update.exe"C:\Windows\TEMP\sdwra_4868_1942489870\service_update.exe" --setup6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --install7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4868_511774629\explorer.exe"C:\Users\Admin\AppData\Local\Temp\scoped_dir4868_511774629\explorer.exe" --pttw1="C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yandex.lnk"6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4868_511774629\explorer.exeC:\Users\Admin\AppData\Local\Temp\scoped_dir4868_511774629\explorer.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=1116 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x2b0,0x2b4,0x2b8,0x28c,0x2bc,0x12321d8,0x12321e8,0x12321f47⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\pin\explorer.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent /pin-path="C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.lnk" --is-pinning7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids.xml"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source4868_1089754797\Browser-bin\clids_yandex.xml"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=searchband --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=searchband --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source4868_1089754797\Browser-bin\clids_searchband.xml"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\SEARCHBAND.EXE"C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\SEARCHBAND.EXE" /forcequiet6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --run-as-service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=4992 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x258,0x25c,0x260,0x234,0x264,0x797ae8,0x797af8,0x797b042⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --update-scheduler2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --update-background-scheduler3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --statistics=https://api.browser.yandex.ru/installstats/send/dtype=stred/pid=457/cid=72992/path=extended_stat/vars=-action=version_folder_files_check_unused,-brand_id=unknown,-error=FONT_NOT_FOUND,-files_mask=66977119,-installer_type=service_audit,-launched=false,-old_style=0,-old_ver=,-result=0,-stage=error,-target=version_folder_files_check,-ui=0FBB20C6_9D2F_40A1_B639_6455DCDFCB04/*2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 29573BCF3CB0834F98834420514659F02⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Installer\searchbandapp.exe"C:\Users\Admin\AppData\Local\Yandex\SearchBand\Installer\searchbandapp.exe" /install1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\searchbandapp64.exe"C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\searchbandapp64.exe" /auto2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\crashreporter64.exeC:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\crashreporter64.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\searchbandapp64.exe"C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\searchbandapp64.exe" /update-check3⤵
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.5.0.1923\searchbandapp64.exe"C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.5.0.1923\searchbandapp64.exe" /update-install4⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.5.0.1923\searchbandapp64.exe"C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.5.0.1923\searchbandapp64.exe" /auto5⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.5.0.1923\crashreporter64.exeC:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.5.0.1923\crashreporter64.exe6⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --progress-window=459186 --ok-button-pressed-time=420131664 --install-start-time-no-uac=4208660581⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id= --annotation=main_process_pid=4492 --annotation=metrics_client_id=d1230ac14709496ca8a57bd58c455906 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x184,0x188,0x18c,0x160,0x190,0x724ea3b0,0x724ea3c0,0x724ea3cc2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=1932 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Storage Service" --mojo-platform-channel-handle=2320 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=ru --service-sandbox-type=audio --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Audio Service" --mojo-platform-channel-handle=2864 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Video Capture" --mojo-platform-channel-handle=3120 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=3424 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\Installer\setup.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\Installer\setup.exe" --set-as-default-browser2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\Installer\setup.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\Installer\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=4712 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x338,0x33c,0x340,0x314,0x344,0x9121d8,0x9121e8,0x9121f43⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=3652 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --mojo-platform-channel-handle=4032 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --mojo-platform-channel-handle=4368 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=speechkit.mojom.Speechkit --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Speechkit Service" --mojo-platform-channel-handle=4380 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5056 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=5352 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=uwp_cookie_provider.mojom.UwpCookieProvider --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name=uwp_cookie_provider.mojom.UwpCookieProvider --mojo-platform-channel-handle=5172 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --mojo-platform-channel-handle=5900 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:12⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\browser_diagnostics.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\browser_diagnostics.exe" --uninstall2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --mojo-platform-channel-handle=6472 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=6152 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=4572 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5144 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6716 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6704 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5720 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5808 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6512 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6636 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=3772 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6996 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7000 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7008 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7016 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6644 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7024 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7048 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7056 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7064 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7072 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7084 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7184 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7304 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7352 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7624 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7648 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=8148 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --mojo-platform-channel-handle=4424 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=4772 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=5124 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=2552 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=1664 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=2768 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=1820 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1672 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --mojo-platform-channel-handle=4416 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=5384 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=6028 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=6192 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=spell_checker.mojom.SpellChecker --lang=ru --service-sandbox-type=utility --utility-enable-offline-spellchecker --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Проверка правописания" --mojo-platform-channel-handle=2020 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1212 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2416 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 --enable-elf-protection /prefetch:22⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=8144 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=2404 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=7780 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=3692 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=9264 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=2376 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=6028 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=3696 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=9188 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueTool\21.2.26.0\YandexRescueTool.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueTool\21.2.26.0\YandexRescueTool.exe" /uid:"797e9f22-d279-426e-b96c-179d6caffe2d" /yandex_uid:"1646081041666015949" /version:"21.2.26.0" /lang:"ru" /browser:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" /iv:"1" /report_dir:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueToolReport" /browser_user_silent_detect /detect_report_html:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueToolReport\DetectReport.html"2⤵
-
C:\Users\Admin\AppData\Local\Temp\YandexRescueTool\bct.exe/session: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3⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=hips_info_provider.mojom.HipsInfoProvider --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name=hips_info_provider.mojom.HipsInfoProvider --mojo-platform-channel-handle=5956 --field-trial-handle=1972,i,8060516131497429811,3170034736668733916,131072 /prefetch:82⤵
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f0 0x4701⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater --bits_job_guid={4FC3AE6E-49E7-4A50-92E5-4F29022FF33A}1⤵
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666023145 --annotation=last_update_date=1666023145 --annotation=launches_after_update=1 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=6004 --annotation=metrics_client_id=d1230ac14709496ca8a57bd58c455906 --annotation=micromode=broupdater --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x17c,0x180,0x184,0x158,0x188,0x724ea3b0,0x724ea3c0,0x724ea3cc2⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1788 --field-trial-handle=1816,i,16938850265858228812,5946396326221479054,131072 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=1984 --field-trial-handle=1816,i,16938850265858228812,5946396326221479054,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater-stat-bits --broupdater-stat-name=install --bits_job_guid={25A51996-F332-4885-8AB9-784FF6553245}1⤵
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666023145 --annotation=last_update_date=1666023145 --annotation=launches_after_update=1 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=1464 --annotation=metrics_client_id=d1230ac14709496ca8a57bd58c455906 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x724ea3b0,0x724ea3c0,0x724ea3cc2⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1776 --field-trial-handle=2096,i,1691904253368277240,16209413725121762434,131072 /prefetch:22⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=1908 --field-trial-handle=2096,i,1691904253368277240,16209413725121762434,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater-stat-bits --broupdater-stat-name=dayuse --bits_job_guid={BF7B474D-0815-41C0-A4B8-61A3D03F9459}1⤵
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666023145 --annotation=last_update_date=1666023145 --annotation=launches_after_update=1 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=5740 --annotation=metrics_client_id=d1230ac14709496ca8a57bd58c455906 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x724ea3b0,0x724ea3c0,0x724ea3cc2⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1892 --field-trial-handle=1980,i,12054299226668567944,11461224200853622233,131072 /prefetch:22⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=797E9F22-D279-426E-B96C-179D6CAFFE2D --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=2064 --field-trial-handle=1980,i,12054299226668567944,11461224200853622233,131072 /prefetch:82⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
1KB
MD58905590db933109e0c695ee91c664772
SHA158a79eaca1c13ccdaf6839b9f731538fb944208f
SHA256b6e676905808610be7398ddfad44a8883a980e2e8ea6f800a94d04e131d62527
SHA5122156158dbb8a9bc976a82fc4649ff077acf1b19c6834acf58604cbf571e1692124822b716fb0ab4ed3c01fae96763d6a50388f76a6c95986ce0ed153c0e749c4
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
2KB
MD58616b422e9c2b2e839bfdad6cccbaf66
SHA102f026232c476f6ef9db76137badc89b201d1f8f
SHA25625280fc06456ef7b5982adadda7039392283d01dc49752114258addd3cbac7f8
SHA51296a077648067adce37e5ab9dd1766e8e4478f01a1151cc3dd10423c020f2ddf1c7c5ce898b99dfac64f62e49250fe95ea8029563780e361f5990290332399807
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
2KB
MD58616b422e9c2b2e839bfdad6cccbaf66
SHA102f026232c476f6ef9db76137badc89b201d1f8f
SHA25625280fc06456ef7b5982adadda7039392283d01dc49752114258addd3cbac7f8
SHA51296a077648067adce37e5ab9dd1766e8e4478f01a1151cc3dd10423c020f2ddf1c7c5ce898b99dfac64f62e49250fe95ea8029563780e361f5990290332399807
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
2KB
MD58616b422e9c2b2e839bfdad6cccbaf66
SHA102f026232c476f6ef9db76137badc89b201d1f8f
SHA25625280fc06456ef7b5982adadda7039392283d01dc49752114258addd3cbac7f8
SHA51296a077648067adce37e5ab9dd1766e8e4478f01a1151cc3dd10423c020f2ddf1c7c5ce898b99dfac64f62e49250fe95ea8029563780e361f5990290332399807
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
2KB
MD51d43dcebe92fcfdc9bc2304e8faf30a8
SHA1fe943794593211128bb04383c92eeb48123ef1f0
SHA256c08f50cfba43d377e117747dfdcc7528911f185525c3a065661bbec971414911
SHA5120bcf33d134aa449c837cec2af48e5cbb137b68815e12f3e67ab182037e2cf2829f737f6a078d9cb87940890383d20882e019713505c0c98b655c5a57c8c35d04
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
3KB
MD5f589441078b04077dd3aedaeaafe0e9a
SHA199c61782e1bd15002dac445c3abff7885d5b709c
SHA256caafa56bc1b37b963d52937f7a1e9fee619af47952a95399c1a046cef3ce9bae
SHA51211cab375d5b33a47d00ae0848d09bedcb7a1c6c7e085e090c25d93148590201098aef5ef7dcbf9a5f11a1aa9ea3b58e376911147507ffa2cc47202899dcc8c26
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
4KB
MD5bf55e66152a5d33dd838015670e1a717
SHA1bd8c50ee092099bd1d0a2af9daceb49feed7515d
SHA256415ed20ce06f0a44645ea35784ff99c1312ef4c350648b7fa55bb902aaad56a4
SHA5122d78d1732bc583e0a6e99a6d00143c9b797555dab2e68a056ff6cd390cc8c270de360463a40fc347b69839142af02c09db32d7b22be8d2d2e6e75e7b8c993655
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
5KB
MD5ee371c2cb437776ffbcce9d182e02466
SHA13d20524b6f18e47fe5f820223c68d4f8242e11e5
SHA25635fed9cad21b2111eda2098cee9b21815452de0548d03d3a39ecb1d7f342e690
SHA512f5ab37c28a4d943468e50176ca7550ff2a22a1734db1c816ade69360562adf11623ce22540866c37e8b997cf3ca8b2f78cacb36a10a0264423ee4ccf8dd851a3
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
5KB
MD570fe48ce0945ed919a9e2d1f378bd454
SHA10057f920c4ac8c12e610cddc4fc81bf78be08053
SHA256356aac63bb1f334e15b5f4215a68157ab7009592c8c05d6b69371b2ab666ebb7
SHA5123f3eeaecf72aac1a448c7dd676ad1debb49f272288a8c1ebda28bb9b5fab0eecbcf85213748df928751d06e0a9ac0520d24f1e58ac0fc11379dc520030acdf02
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
5KB
MD5fa122394a6d322597c39243573bc0244
SHA17f93127263b609925c95cc3b4ececc8fc0aa835c
SHA256c1fff81968e468d43c46cadedc4efe84dad06b5eafaa0e8735902820b1634e47
SHA512c920b195e6651bf0f8d7eca1cdb67f37526809f1f251fd9b3561ca02a983b9add9e1297abdf5b8e76a10638e8a4bff91106e23e5a9fa3da93adea969faa72589
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
8KB
MD5d6395b0f66a6a29794bdc12f8d7c2546
SHA1c0da0f99ecf2e2e9814868945836115c994ea21b
SHA2569cb360e3821e5b7eed64a2f323b9dcf179ce0305a658bc322cdfe954ca77f355
SHA512e544b1d50caeaa3f97f84401830a4fa04f965b089631a0c573eca923a09ac6597488c5b63bec78a1953f137d4306574a8656714e2ed7017300503b791362eb4e
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
9KB
MD55124a75d9ec8cf2b29b4a063db21ed94
SHA12ba8c4819bbe81d8bacf2439818d91e65063a0c5
SHA256c20ebd301d2e36f20040660c32daf68648f0407eb004c2a1ce01e580a663f27d
SHA51238d500247035e82f8de2c238c2017d1119a78da07709d16948413a82ea0a8ad5760d627be3c6a6b1093b67fe5e7794bfafb46a29ee28fca7d06af31063f9acfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
1KB
MD523f9423cf524effb7face1eb98d52a8c
SHA1eb955023494ed7a84206ef31f949abe63dd68be2
SHA256665e08a4aa1f6a4dc2407396b4ddac675dace1af690d87a988d013afe4c47651
SHA512987cfed79741992d50cffea008903772c3eec9bcb17a6edb2656935e8796ef5d168f7a98df101c36ff8160f5d6ed608bd139d43f15502c993f49a862263b4416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2Filesize
1KB
MD5702336d313fa6f1bc13a50f29e3b81f5
SHA1432c93866ab439af4625329205a69a91d3f68f39
SHA256d28fe506481585650dd7337c1e620b07f7aa469cfc19f30b9d271ccfcfaf061f
SHA5128fc04d083fb27b5e1a0b4b10fe93d4c3420b356d2a7a8870d502803a6d3882f474ddf42ac567e1c64858bdedced9e50a85175ec46f2dca002845437652b5c4bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_EBD7B8AF3A6D56C51CDE1B85E8C855A8Filesize
1KB
MD5823de32c84c2baf818b7de475520ecba
SHA180ed0a0396cb7fc09249b2e7cb01f60cde331c7c
SHA256c38283d9d2292fd2fc270a8e445d44797c4e5169e2f59a5769e53cde0af104e1
SHA512904294988a1fb57821a17daff7e75ac8d9d1dd8cb0d6a8082be2f117fc379ec3472240935ca3187b436ce2adb6f7facb3c3f8ff60b40360a94cc829f00a134cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2Filesize
727B
MD53dc4181e96e768b9f4bbf41d1afa1dc1
SHA19ee79c2f26bf520c4e8a3b36daff9ce8e6e3cca8
SHA256a72e1936399b803b5c282aa625b1dd2e3c924897ba728887035ebd30a4e9eae4
SHA5128c6c6ec2b6513697995aac13b9f946a7f5442cea77d0d3053ae9cf0d7dedd6942c8eceabfcd0380156403002bea026b3b18d4926fec92a146faf41f0144a7958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBFilesize
471B
MD5da5a9f149955d936a31dc5e456666aac
SHA1195238d41c1e13448f349f43bb295ef2d55cb47a
SHA25679ac574c7c45144bb35b59ff79c78dc59b66592715dea01b389e3620db663224
SHA51260d7d1f5405470ba1e6b80066af2e78240acbea8db58b5a03660874605178aebaa9ce342ca97f17798109e7411e82466db5af064e39eaddc05410f2abe672f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554EFilesize
1KB
MD502314b49c485931487cbf65bbb941e27
SHA100b077929a8749f26e3c8d7c44af4bb68a584ecf
SHA2564345a9a343cba6c888918ca8d3166056b80ec313a511174af18a4e0b2f9bcc01
SHA5121df80e9ed10abf24ae2662f3112b8737492ad5d4c2f6232b19b3fc036c2595a67f828673e774ad0ab09b336bd8feee09a9506d087ec6a5788036da5b98eac441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
1KB
MD533fb8b8ae9693b689843bf76ca8292ef
SHA1cb79cf07c005d51ab9b194c002dc0ba69457a70d
SHA2567567f15a528544618bc2112ce991866f5048b046b42c67d18ea1807bddfa7a9c
SHA512bd3fb67c20272bca3d5aac6e420c6a719191bebb8d278fdd293546167a4615182fff97fb1f76985709441924d58ac2af99c0f94eb7c475aa9be1cb5910e35a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BBFilesize
727B
MD561c5ee28e0ed1b62787302ea7c2da960
SHA1a1176b0bbbe42255802e481fa75d8f5a4819697e
SHA256f3218c6b9ea5e247e70df55b4f208123b103b5196dc5b46991a48052bf026e8f
SHA512b1af06478913f340bba4e394364f3f8e5b8cdb7f806e8d6597d173047ca1c955f3f755450d00b2739a9a5598b7c58a809127b84bf1191656b599bddbc35339ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
508B
MD5008ef7cfde0c82129caff29e3e75a300
SHA1286043eac4a633dc50d9c742c0225854870e4072
SHA256f325172cce5b3f6d1a141a059b5a418ae67c75760fa6a1922aa6bad109bd3748
SHA5127a6f9ebc4ba32ac774d360bb57a46e6a9f2d7d1ea2baf1faee376eb6627d7544f28b68e83e61761edc12aff956d153f3c16c39d0c7b200b2d597f2857de40061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2Filesize
536B
MD56cbcd32b1675eed3001107c0027b483a
SHA19372e312bebe437a319293f7041cfeeb35922569
SHA256bd371a00316662047071945a7b530d486d2450773325c1826042e6624f991dd0
SHA5125448e75bab8a2d3ff2539f80b0d8a83213aebb16a17cdee4ab05c0ea8b350e57b93277ba637da48bac8220b7d0ac657c2f2e9ed2b003ea8b66b6f8fdd0f0632c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_EBD7B8AF3A6D56C51CDE1B85E8C855A8Filesize
540B
MD57840827fcb9fd239f68c5c81c3d263e3
SHA110dc41eba0f63ea2c46546ff90eacfaeae3371b0
SHA256dee923c41995514055b2a317c4a240c6cd0818419e25eeebe9a06aa37ecff2f5
SHA5128997883a2c004cf952b707f8b2e47822ee7ccccad254ce1e7a7a563fb77508e3641ba3e19bcc4cf5be94937898403578a4d2808d469d4026e0d88c12d0684e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2Filesize
434B
MD5528b7978986e6994a92c2ddade80b571
SHA1f720c4692d0d74e4d738832217008f0196367b8e
SHA25627007985c5c6be2002eb85d5b3f344582a623d56902abe361fada7564245c466
SHA512cb4d08fed70a307f67493d755e3f7543d75d3ea228ea273b4a34128147f242482247404f5f912a8a9f276c718b5f4dda160559b822df32d684f9d5e5ea52298c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBFilesize
430B
MD58f6f88cde08641cfaca4c69a42a6166f
SHA1fff048432a354b0097e066bdb2436bee758a6390
SHA256423289675b030829f28a0d40ed677e3f2e43f06a6db9935dfe5c2ccbc8aa9fde
SHA512e00d06bd20554afe48d324bb88d7320468a3cbb07a5daab546a06257d935425e672376e0c0cd0e1d0d4fbc92cc5fc816a91eab215bfead74c62416c9e9feda51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554EFilesize
536B
MD586f89f20a7162cf606959275b7497cdb
SHA1e5283aee24997fa682d9cb27806a2915a1f5f19e
SHA25691a6d83f5c1208a82bbb32abfe64a4d9fc81260158ffbba7160e0c613e83fcfe
SHA5122198eda005655132bd92ffd0356138d20f36308cca65f6cfc11244036a3e879d7b2dd31ec17572031a329397b50ebd83c41aeefa46822c9fb89091dd6a8f4d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
506B
MD52c179b11000cc0a36e0dbe6a5f9e7905
SHA1f7dccf198576050d0e38ea8fa70b8fdd91dcbd9b
SHA2562db9c7d95181d39be5002e311fda8e648ce813fa817540989f01b1b2ad21f6bd
SHA5123916aefd2a9ca75a9e50f161ff205f77baf27997e9e3c0ec9ca2525de3d967c1160dcf2631d87d8857ebf8fcb98522d04bf5763527bb3ca31eb91a522f1aa1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BBFilesize
442B
MD5314c781527280a911c91fd1579ef335f
SHA18a90003089b329d403db6d1337633574b9afa623
SHA256d1c6033b14f2eddb3deff33d2039cdaee0ca84706c0224d3bafaf5fdd7b265db
SHA512587aec415b86ca350b2071fa5edb06a5bf538b54679151da48510c2e185c835d2c9d8838c24057d7614f8408b1187860bf827a5085961d29ec2da6f9da987dad
-
C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\BRAND_COMMONFilesize
23.3MB
MD5105d3263b0bca342b425fc45702c8856
SHA100180722d29af289bb7d2138a52b9d784ce367da
SHA2567547bc1f22cb361a4e644f899f8494faa013e15f05b75b77e1ea596532dc4fee
SHA512f6d3a7a25af1c10bbf5fb18b406f30c2c7d92778731f6b6d3eb6f181bc7854e920f99e1f55d2fdc0484bd1bd9bb13942ef13da85d1823c1f5cba16568cb45efb
-
C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\BROWSER.PACKED.7ZFilesize
90.8MB
MD55e99de825a34c299b8eef00c8d475e3d
SHA16fc1d9ef19f3d2aae0fb4ac596afbb24b408d83d
SHA2566f945efb7783b3ba9b8b48ffef9dc62322d11d51c401bbeaa1cf0aebf768b4ed
SHA512dd272ce4dd7f4529fb4b4a182cab7fa63bae0f455ea5bf843888c59d9fc13d1564b0f436b5afcd2c3d449979dcd82e0c71f45b6ae54e41e1ebbb649dd060e68a
-
C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\brand_yandexFilesize
2.1MB
MD5cff7f43a37e2081aa5271b2e42e20699
SHA19d50fec6b4b583e6b90cbc6906bb6838ded606d8
SHA25658ee5e657246dadd99f6194ffe082a27a8896aaa4500ff6773054a3929a912fd
SHA5124eb33ae0d9c9afb8116c9454b1ce06cefc6f59f21463ba9c04d45ed09b3fe61d1ef3aee1570e92d2657d4f6d33a603288f5ff5c04464bb6da75e16002763e2de
-
C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\YB_DCFA5.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\clids.xmlFilesize
599B
MD5dae47d5fb36af27a9869750c11f52494
SHA1366629747a061c7bd6a6883f5364734cecfc697a
SHA25637ec2fcea5119863c67d94c2d269ec242e294cb76c9674e793d7280b6fd13c90
SHA5126937d3a2f3c4ecd3544a473a79808f1932e036cbafe6bff11d51f5d131fd8b6e594dbdfb254f96f49177cac5517e536bc14d855beaf3c81349ddbf7324bf79b4
-
C:\Users\Admin\AppData\Local\Temp\distrib_infoFilesize
293B
MD55ff4663cf4ed5b1c4c7e84ae7a26484b
SHA1738deb4f237c34acab7ecf6a2899c7bd94ecd34a
SHA256f69eb6cd9983e819f7c1273598046ace4ef35c97cc651b89b460bb05dbd58c81
SHA512f9f7a15bd4d811d0a0a986d24b18d76434f89f81f6554cf0f707a0298a26f0732389e85394d186dd22a6c0306b8568c94d5583891196328e0e3945f44af59bbc
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
13KB
MD5b29e11b9d1ce0b0d1c1f1b0b59867d62
SHA15a4da4874b398663297c14465524e01e04a1bb7d
SHA25606c74dbb518562048f5631bdef869d940eee8ff6ed77b2e97ecbf3ff7fa07309
SHA51250edd83d30a354e06f8f479319e2e6352f31baf1879ce62523e1c275fb9c27257f92d53470353b9cbab307c69cb15064a27d2f1036f6eeb389f11c64c5e795fb
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
13KB
MD5dae49deb7222bc3220fc69a3091834da
SHA1a65cdd9aed0b7dd83fbd07d0f592537ec36f0195
SHA256393c201539676f735d350f1a5e21dfe5f1d252e4cce864fcad34109adef1eab6
SHA512df1a2f1f16918a50f58d0ba68212cc5b4385184fbe0f97bb57a6d3070fa5d5b05ff766c533fac196ad5c84fb76b18728c2c402cceffa273df2f29c7d2bf02ed5
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
25KB
MD5e62c506874653458ec23a99d4704df95
SHA15a4192568cb21f260ceb786dcbc3b3a54d535793
SHA256fe9aff5b2b09088f1e3aca4a24a3fa3510ac066873265d05d7d19d47a48d9812
SHA512b9a4703427cbafad8cef40d51f5ffd72e83734b60db6ef582a682b9154894f82fef1a17bba5d82dbe629a0228d8b236f3bd586524bb80a1592b3ec6f04433a65
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
26KB
MD5b256388e05fc22e883ada7af3ff22c18
SHA13837c5298c2fd10ccafc56e7946ac1e02f729f7e
SHA2565de6822edb726f7eeb9962b3b9c9b189a2c258d24f2378899cdc85ec24c9eb44
SHA512b74704c7f259ad45c2f502fb1f7510fa5a47bf983610d95f2c1f90d176f87d3228930bee57838c741bbc9b99ce59cf28672688ed6d1b357338e3e07caaeaeaf1
-
C:\Users\Admin\AppData\Local\Temp\master_preferencesFilesize
129KB
MD5517cebb5d922c6be230ce63948323b5e
SHA142cdd2f94dd6258441645e831552fc609e801e44
SHA256fdd8fee19d1fb229f1bd4e6cdf703c69cda41278191165f337af6542c66847da
SHA512c43e59415c5d8f3d0a842f273326348cc3593226183285bf006c4772a21430907c675e50451e3d6f4c72bc3febff1d34a57654bd8bc6c8e59da1bcc6e84d6a6e
-
C:\Users\Admin\AppData\Local\Temp\master_preferencesFilesize
129KB
MD5517cebb5d922c6be230ce63948323b5e
SHA142cdd2f94dd6258441645e831552fc609e801e44
SHA256fdd8fee19d1fb229f1bd4e6cdf703c69cda41278191165f337af6542c66847da
SHA512c43e59415c5d8f3d0a842f273326348cc3593226183285bf006c4772a21430907c675e50451e3d6f4c72bc3febff1d34a57654bd8bc6c8e59da1bcc6e84d6a6e
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4868_511774629\explorer.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4868_511774629\explorer.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\website.icoMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\yandex_browser_installer.logFilesize
5KB
MD5e4b61bd5d38bc6ea7146ed52d92a8531
SHA129f33be893cf81b9fc216f21d550d5180440ad92
SHA256320021c9a10f451dbf43363618db61e3aab6a5be05a4d9a32ccea461884fcd26
SHA512b4d84e583dd3e944d79551b59b992fdea83c44da4ebe95c3b9b0eb6da6660c2ee8b169612cebbe9951fe60b309616ac6a004e47b0b212eef75b9654fb9bae276
-
C:\Users\Admin\AppData\Local\Temp\yandex_browser_installer.logFilesize
23KB
MD5a4f5b614423dacca5e4830e4dfcf0bb5
SHA1cac4ffa25aa6e7057d593859fcfbcd3be9bdf2b5
SHA256168a49c604bd87d3728c6de7478d189335099bec2039000f856f66d632987c36
SHA5124fdced2de7aeb9d7e6f1f918bc7cc7ed13a3e55da7826bdc5dbef5d77ab1764fc8037c61ab788c113cff29d22d4cff8e83576155c4f8ef508b7cb8a86ef9f439
-
C:\Users\Admin\AppData\Local\Temp\yb7498.tmpFilesize
149.8MB
MD5ff228e3e10f4d98d961e8a361861180d
SHA130fb83fafd7e79ed0ecd11a5231773d46a83e9f7
SHA256b64ea939b798557ffe48495520fb4a0e249a30d316cefc8c4ceca021b4b091ad
SHA5121763b1fc773aa4a3f6e34157751b7707467916ffee91d0ddf2096fe2bc5bffe677229de1ed35a47d35af4c25139d624189a8d5c418de8174126aef0f0bfc85e9
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeFilesize
591KB
MD510d2e0956493b129149705225fa3efb3
SHA1547ca5cb2eb4ad2dadb93e68869d1d8b26b395c1
SHA256a439fddafa27eacf7bfd86fd46c0683f9cd31c0a752b9abc522be77f295f1b1e
SHA512df4769611bf5d9a7458e641c97134ad2553bf01a834b2d08e1919153189860fce42cc712ea5182211f03d5c2c6d42967cd43129323adf21b146f21aaab04d253
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeFilesize
591KB
MD510d2e0956493b129149705225fa3efb3
SHA1547ca5cb2eb4ad2dadb93e68869d1d8b26b395c1
SHA256a439fddafa27eacf7bfd86fd46c0683f9cd31c0a752b9abc522be77f295f1b1e
SHA512df4769611bf5d9a7458e641c97134ad2553bf01a834b2d08e1919153189860fce42cc712ea5182211f03d5c2c6d42967cd43129323adf21b146f21aaab04d253
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeFilesize
3.8MB
MD52fadcc66fdf395c8fd19a424745a855c
SHA1b40174f66741be5f5afc814b3797dd5af7891b30
SHA256d43da70412b55377532192ab6658074bd73592ab1552a1bb53edf823ee655972
SHA5123ac2d369e2708309bac2796071bbd53c32fb462ea0373898c5701d3d776b4ce573eb28275148cebff2f2602cf8922f4dd7ddd9ecc533988a1a05e8578b6b6633
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad\settings.datFilesize
48B
MD553defde96d71bf145204a5a94adc20c0
SHA16e453d3b81d6fbeaef7a5a72479eb3fecf73b559
SHA25653e2bbea814bb4e3d7288d766faf7bad0a2679f61f1594eee70abc68636ce417
SHA5127d26801aac372dfa76bbb95296e0ee98bbde9ac240b7f6b1654bd76d28a68af17109cc776215329d91010ae898fc02b4f878fb65f030ada59ff7d45d1c978409
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yandex.lnkFilesize
2KB
MD5c5d9b590f9c57fddebc9f5f66978e317
SHA17934d13ae194aaa755e2526f8d65f5f84992ed22
SHA2560721b5bd3db5cdaa3a8d07df1b80e4f3bdaaec0cae1d84ba7d3974589e79bc91
SHA5122cfe18467076fe83303f0aecfe47296d94767177788e3e0c881483b3013cae42b56dd75756b10d69f03c2edebe2783cc187e4efab3d2ae7d21fb2f68046908ad
-
C:\Users\Admin\AppData\Roaming\Yandex\uiFilesize
38B
MD597c6166e6431a2822921230dcd22739c
SHA1409ccca3fc91a114b06374ac6fdfe8b801981625
SHA256481d93ef662d7755766d48bc6606b783ca1a42f174611711215767182fb3abdf
SHA5128ba1e2937be3f35381e42c9a5adce9b7fd25ca516cff1ec66a868f287df4f3ba2ecf7d513b57a044dba2b833787086435cc5e05eb8d39f9b8ffeac089cdd3b54
-
C:\Windows\TEMP\sdwra_4868_1942489870\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Windows\Temp\sdwra_4868_1942489870\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
memory/628-210-0x0000000000000000-mapping.dmp
-
memory/628-229-0x0000000000000000-mapping.dmp
-
memory/988-241-0x0000000000000000-mapping.dmp
-
memory/1116-196-0x0000000000000000-mapping.dmp
-
memory/1136-245-0x0000000000000000-mapping.dmp
-
memory/1560-235-0x0000000000000000-mapping.dmp
-
memory/1676-174-0x0000000000000000-mapping.dmp
-
memory/1840-213-0x0000000000000000-mapping.dmp
-
memory/1876-132-0x0000000000000000-mapping.dmp
-
memory/2088-344-0x0000000000000000-mapping.dmp
-
memory/2164-171-0x0000000000000000-mapping.dmp
-
memory/2248-199-0x0000000000000000-mapping.dmp
-
memory/2304-138-0x0000000000000000-mapping.dmp
-
memory/2740-218-0x0000000000000000-mapping.dmp
-
memory/2844-250-0x0000000000000000-mapping.dmp
-
memory/3064-225-0x0000000000000000-mapping.dmp
-
memory/3284-248-0x0000000000000000-mapping.dmp
-
memory/3436-212-0x0000000000000000-mapping.dmp
-
memory/3460-140-0x0000000000000000-mapping.dmp
-
memory/3500-349-0x0000000000000000-mapping.dmp
-
memory/3624-148-0x0000000000000000-mapping.dmp
-
memory/3688-214-0x0000000000000000-mapping.dmp
-
memory/4128-334-0x0000000000000000-mapping.dmp
-
memory/4208-254-0x0000000000000000-mapping.dmp
-
memory/4280-178-0x0000000000000000-mapping.dmp
-
memory/4336-209-0x0000000000000000-mapping.dmp
-
memory/4364-260-0x0000000000000000-mapping.dmp
-
memory/4408-216-0x0000000000000000-mapping.dmp
-
memory/4416-183-0x0000000000000000-mapping.dmp
-
memory/4456-265-0x0000000000000000-mapping.dmp
-
memory/4488-193-0x0000000000000000-mapping.dmp
-
memory/4496-215-0x0000000000000000-mapping.dmp
-
memory/4568-206-0x0000000000000000-mapping.dmp
-
memory/4692-211-0x0000000000000000-mapping.dmp
-
memory/4696-233-0x0000000000000000-mapping.dmp
-
memory/4712-230-0x0000000000000000-mapping.dmp
-
memory/4808-226-0x0000000000000000-mapping.dmp
-
memory/4868-144-0x0000000000000000-mapping.dmp
-
memory/4912-222-0x0000000000000000-mapping.dmp
-
memory/4972-220-0x0000000000000000-mapping.dmp
-
memory/4980-243-0x0000000000000000-mapping.dmp
-
memory/5028-186-0x0000000000000000-mapping.dmp
-
memory/5156-267-0x0000000000000000-mapping.dmp
-
memory/5204-268-0x0000000000000000-mapping.dmp
-
memory/5240-270-0x0000000000000000-mapping.dmp
-
memory/5248-329-0x0000000000000000-mapping.dmp
-
memory/5364-276-0x0000000000000000-mapping.dmp
-
memory/5380-339-0x0000000000000000-mapping.dmp
-
memory/5544-280-0x0000000000000000-mapping.dmp
-
memory/5552-354-0x0000000000000000-mapping.dmp
-
memory/5616-282-0x0000000000000000-mapping.dmp
-
memory/5624-359-0x0000000000000000-mapping.dmp
-
memory/5708-287-0x0000000000000000-mapping.dmp
-
memory/5724-290-0x0000000000000000-mapping.dmp
-
memory/5744-293-0x0000000000000000-mapping.dmp
-
memory/5788-364-0x0000000000000000-mapping.dmp
-
memory/5804-299-0x0000000000000000-mapping.dmp
-
memory/5872-304-0x0000000000000000-mapping.dmp
-
memory/5896-369-0x0000000000000000-mapping.dmp
-
memory/5936-308-0x0000000000000000-mapping.dmp
-
memory/5960-374-0x0000000000000000-mapping.dmp
-
memory/5984-313-0x0000000000000000-mapping.dmp
-
memory/6048-318-0x0000000000000000-mapping.dmp
-
memory/6108-324-0x0000000000000000-mapping.dmp