Resubmissions
17-10-2022 19:36
221017-ybkpeacgf7 1017-10-2022 17:27
221017-v1ye1scfdl 817-10-2022 14:10
221017-rg6qhacbgq 8Analysis
-
max time kernel
1666s -
max time network
1797s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
17-10-2022 19:36
Static task
static1
Behavioral task
behavioral1
Sample
Yandex.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Yandex.exe
Resource
win10-20220812-en
General
-
Target
Yandex.exe
-
Size
2.4MB
-
MD5
09bb3df23630c9111a5860cb96bde6ad
-
SHA1
217d78e392e7ef295596862175eb353977a85738
-
SHA256
e36891d982acaa5b12e27cf55fae3581e29dd0ef35d0dd98ae93296034b5177e
-
SHA512
8a216eac67b5d4bc54781a166cd48ab8a68e0b983fb346c14030eca060046fe7484f76fa4eb006164c5781684cad82f7d29afaf9514e70c81feffe70df402f31
-
SSDEEP
49152:CsEpJsMKSCZrcPEGuW9Q+iA5H5u8QeuL:CsEpuBZrcPEGuWMxt
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
ybE995.tmpsetup.exesetup.exesetup.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.execonhost.exeservice_update.exeYandex.execlidmgr.execlidmgr.execlidmgr.execlidmgr.exeSEARCHBAND.EXEsearchbandapp.exebrowser.exebrowser.exesearchbandapp64.execrashreporter64.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser_diagnostics.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exesearchbandapp64.exesearchbandapp64.exesearchbandapp64.execrashreporter64.exebrowser.exepid process 1124 ybE995.tmp 1636 setup.exe 1040 setup.exe 2024 setup.exe 1280 service_update.exe 1956 service_update.exe 1724 service_update.exe 1940 service_update.exe 1552 service_update.exe 1576 conhost.exe 1796 service_update.exe 1488 Yandex.exe 1744 clidmgr.exe 1768 clidmgr.exe 556 clidmgr.exe 864 clidmgr.exe 708 SEARCHBAND.EXE 1932 searchbandapp.exe 1624 browser.exe 1612 browser.exe 364 searchbandapp64.exe 108 crashreporter64.exe 1100 browser.exe 1628 browser.exe 2212 browser.exe 2372 browser.exe 2536 browser.exe 2752 browser.exe 2892 browser.exe 2332 browser.exe 2288 browser.exe 2488 browser.exe 2436 browser.exe 2836 browser_diagnostics.exe 2952 browser.exe 2764 browser.exe 3168 browser.exe 3376 browser.exe 3636 browser.exe 3932 browser.exe 3948 browser.exe 3176 browser.exe 2544 browser.exe 2320 browser.exe 2448 browser.exe 3292 browser.exe 3732 browser.exe 2092 browser.exe 3012 browser.exe 2836 browser.exe 3268 browser.exe 2552 browser.exe 2800 browser.exe 2896 browser.exe 3476 browser.exe 2488 browser.exe 2756 browser.exe 1572 browser.exe 2984 browser.exe 3412 searchbandapp64.exe 3352 searchbandapp64.exe 3680 searchbandapp64.exe 3004 crashreporter64.exe 1424 browser.exe -
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
browser.exebrowser.exesearchbandapp64.exesearchbandapp.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation searchbandapp64.exe Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation searchbandapp.exe Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation browser.exe -
Loads dropped DLL 64 IoCs
Processes:
Yandex.exeYandex.exeybE995.tmpsetup.exesetup.exeservice_update.exeservice_update.exeservice_update.exeYandex.exeMsiExec.exebrowser.exebrowser.exesearchbandapp.exesearchbandapp64.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 1972 Yandex.exe 1972 Yandex.exe 1972 Yandex.exe 1784 Yandex.exe 1124 ybE995.tmp 1636 setup.exe 1636 setup.exe 1636 setup.exe 1040 setup.exe 1040 setup.exe 1040 setup.exe 1280 service_update.exe 1280 service_update.exe 1280 service_update.exe 1280 service_update.exe 1280 service_update.exe 1724 service_update.exe 1724 service_update.exe 1552 service_update.exe 1040 setup.exe 1040 setup.exe 1040 setup.exe 1724 service_update.exe 1040 setup.exe 1040 setup.exe 1488 Yandex.exe 1040 setup.exe 1040 setup.exe 1040 setup.exe 1040 setup.exe 1040 setup.exe 1332 MsiExec.exe 1332 MsiExec.exe 1332 MsiExec.exe 1332 MsiExec.exe 1332 MsiExec.exe 1332 MsiExec.exe 1624 browser.exe 1612 browser.exe 1932 searchbandapp.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 1224 364 searchbandapp64.exe 1624 browser.exe 1624 browser.exe 1100 browser.exe 1628 browser.exe 1628 browser.exe 1100 browser.exe 1100 browser.exe 1100 browser.exe 1100 browser.exe 2212 browser.exe 2372 browser.exe 2212 browser.exe 2372 browser.exe 2536 browser.exe 2752 browser.exe 2536 browser.exe 2752 browser.exe 2892 browser.exe 2892 browser.exe 2332 browser.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
searchbandapp64.exesearchbandapp64.exebrowser.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\YandexSearchBand = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\SearchBand\\Application\\5.5.0.1923\\searchbandapp64.exe\" /auto" searchbandapp64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\YandexSearchBand = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\SearchBand\\Application\\5.0.0.1903\\searchbandapp64.exe\" /auto" searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\YandexBrowserAutoLaunch_45886AE68CD319C7351FF54A1DBD4B87 = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --shutdown-if-not-closed-by-system-restart" browser.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
browser.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA browser.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe -
Drops file in System32 directory 11 IoCs
Processes:
service_update.exebct.exeservice_update.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 service_update.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\_[1].js service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2 service_update.exe File opened for modification C:\Windows\System32\GroupPolicy bct.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini bct.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Yandex\ui service_update.exe -
Drops file in Program Files directory 3 IoCs
Processes:
service_update.exeservice_update.exedescription ioc process File opened for modification C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe service_update.exe File opened for modification C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\debug.log service_update.exe File created C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe service_update.exe -
Drops file in Windows directory 17 IoCs
Processes:
conhost.exeservice_update.exemsiexec.exebrowser.exedescription ioc process File created C:\Windows\Tasks\Update for Yandex Browser.job conhost.exe File created C:\Windows\Tasks\Repairing Yandex Browser update service.job service_update.exe File opened for modification C:\Windows\Installer\MSI764D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7C29.tmp msiexec.exe File opened for modification C:\Windows\Installer\6e7072.ipi msiexec.exe File created C:\Windows\Tasks\Обновление Браузера Яндекс.job browser.exe File created C:\Windows\Installer\6e7070.msi msiexec.exe File created C:\Windows\Installer\6e7072.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI7AF0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI85AD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI85EC.tmp msiexec.exe File opened for modification C:\Windows\Installer\6e7070.msi msiexec.exe File created C:\Windows\Tasks\System update for Yandex Browser.job service_update.exe File opened for modification C:\Windows\Installer\MSI74F4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI761E.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\6e7074.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
browser.exebrowser.exebrowser.exebrowser.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe -
Processes:
searchbandapp64.exesearchbandapp64.exesearchbandapp64.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL\searchbandapp64.exe = "1" searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\searchbandapp64.exe = "11000" searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL\searchbandapp64.exe = "1" searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM\searchbandapp64.exe = "0" searchbandapp64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Low Rights searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\searchbandapp64.exe = "11000" searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\searchbandapp64.exe = "0" searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\searchbandapp64.exe = "0" searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING\searchbandapp64.exe = "1" searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM\searchbandapp64.exe = "0" searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION searchbandapp64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING\searchbandapp64.exe = "1" searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL searchbandapp64.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch searchbandapp64.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
service_update.exeservice_update.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A96991D5-ADE0-412D-8A77-8AB6BFC082CD}\2e-6d-54-8a-3b-9a service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\Yandex service_update.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A96991D5-ADE0-412D-8A77-8AB6BFC082CD} service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs service_update.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs service_update.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 service_update.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A96991D5-ADE0-412D-8A77-8AB6BFC082CD}\WpadDecisionTime = 0038b5f370e2d801 service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2e-6d-54-8a-3b-9a\WpadDecision = "0" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Yandex service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2e-6d-54-8a-3b-9a\WpadDecisionReason = "1" service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A96991D5-ADE0-412D-8A77-8AB6BFC082CD}\WpadDecision = "0" service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2e-6d-54-8a-3b-9a service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\Yandex\UICreated_SYSTEM = "1" service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A96991D5-ADE0-412D-8A77-8AB6BFC082CD}\WpadNetworkName = "Network 3" service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust service_update.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" service_update.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2e-6d-54-8a-3b-9a\WpadDecisionTime = 0038b5f370e2d801 service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates service_update.exe -
Modifies registry class 64 IoCs
Processes:
browser.exesetup.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexCRX.RZVB4PDS4RFN2QCKFMSALXB3OA\shell\open\command browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SystemFileAssociations\.webp\shell\image_search\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --image-search=\"%1\"" browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SystemFileAssociations\.tiff\shell browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SystemFileAssociations\.tif\shell\image_search browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.html setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexPNG.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexTIFF.RZVB4PDS4RFN2QCKFMSALXB3OA\shell browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.fb2 browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexEPUB.RZVB4PDS4RFN2QCKFMSALXB3OA\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexWEBM.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexSWF.RZVB4PDS4RFN2QCKFMSALXB3OA\ = "Yandex Browser SWF Document" browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.js\OpenWithProgids browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexSWF.RZVB4PDS4RFN2QCKFMSALXB3OA\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexWEBP.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.js setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\yabrowser\DefaultIcon setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexCSS.RZVB4PDS4RFN2QCKFMSALXB3OA browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexFB2.RZVB4PDS4RFN2QCKFMSALXB3OA\shell browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexGIF.RZVB4PDS4RFN2QCKFMSALXB3OA\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.htm browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexTIFF.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-119" browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SystemFileAssociations\.png\shell browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.xhtml\ = "YandexHTML.RZVB4PDS4RFN2QCKFMSALXB3OA" browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SystemFileAssociations\.tif\shell\image_search\command browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.webm\OpenWithProgids\YandexWEBM.RZVB4PDS4RFN2QCKFMSALXB3OA browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexHTML.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-108" setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\yabrowser\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexFB2.RZVB4PDS4RFN2QCKFMSALXB3OA browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexGIF.RZVB4PDS4RFN2QCKFMSALXB3OA\shell browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexEPUB.RZVB4PDS4RFN2QCKFMSALXB3OA\ = "Yandex Browser EPUB Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexTXT.RZVB4PDS4RFN2QCKFMSALXB3OA setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\yabrowser\shell\ = "open" setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.htm\OpenWithProgids browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\yabrowser\shell browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.xht\ = "YandexHTML.RZVB4PDS4RFN2QCKFMSALXB3OA" browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexTIFF.RZVB4PDS4RFN2QCKFMSALXB3OA\ = "Yandex Browser TIFF Document" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexWEBP.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-123" setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexSWF.RZVB4PDS4RFN2QCKFMSALXB3OA\shell\open\command browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexXML.RZVB4PDS4RFN2QCKFMSALXB3OA\ = "Yandex Browser XML Document" browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexEPUB.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-121" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexGIF.RZVB4PDS4RFN2QCKFMSALXB3OA\ = "Yandex Browser GIF Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexINFE.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.fb2\OpenWithProgids browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.htm\OpenWithProgids\YandexHTML.RZVB4PDS4RFN2QCKFMSALXB3OA browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexJPEG.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-109" browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\yabrowser\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SystemFileAssociations\.jpeg browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SystemFileAssociations\.gif browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexTXT.RZVB4PDS4RFN2QCKFMSALXB3OA\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexCRX.RZVB4PDS4RFN2QCKFMSALXB3OA\shell\open browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexCSS.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-124" browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\ftp\shell\open\ddeexec browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexTIFF.RZVB4PDS4RFN2QCKFMSALXB3OA\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexGIF.RZVB4PDS4RFN2QCKFMSALXB3OA\shell\open\command browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexCSS.RZVB4PDS4RFN2QCKFMSALXB3OA setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexEPUB.RZVB4PDS4RFN2QCKFMSALXB3OA\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexJS.RZVB4PDS4RFN2QCKFMSALXB3OA\shell\open\command browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexCRX.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-104" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.htm\OpenWithProgids\YandexHTML.RZVB4PDS4RFN2QCKFMSALXB3OA setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.pdf\OpenWithProgids\YandexPDF.RZVB4PDS4RFN2QCKFMSALXB3OA browser.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.shtml\OpenWithProgids browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexINFE.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-135" setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexJS.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon setup.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\YandexXML.RZVB4PDS4RFN2QCKFMSALXB3OA\DefaultIcon setup.exe -
Processes:
Yandex.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 Yandex.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Yandex.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Yandex.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Yandex.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
setup.exeservice_update.exeservice_update.exeservice_update.exeservice_update.execonhost.exeservice_update.exeSEARCHBAND.EXEmsiexec.exesearchbandapp.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 1040 setup.exe 1280 service_update.exe 1956 service_update.exe 1724 service_update.exe 1724 service_update.exe 1552 service_update.exe 1576 conhost.exe 1796 service_update.exe 1040 setup.exe 708 SEARCHBAND.EXE 960 msiexec.exe 960 msiexec.exe 1932 searchbandapp.exe 1040 setup.exe 1624 browser.exe 1100 browser.exe 1628 browser.exe 2212 browser.exe 2372 browser.exe 2536 browser.exe 2752 browser.exe 1624 browser.exe 2892 browser.exe 2332 browser.exe 2288 browser.exe 2488 browser.exe 2436 browser.exe 2952 browser.exe 2764 browser.exe 3168 browser.exe 3168 browser.exe 3376 browser.exe 3376 browser.exe 3636 browser.exe 3636 browser.exe 3932 browser.exe 3932 browser.exe 3176 browser.exe 3176 browser.exe 2544 browser.exe 2544 browser.exe 2320 browser.exe 2320 browser.exe 3732 browser.exe 3732 browser.exe 3292 browser.exe 3292 browser.exe 2092 browser.exe 2092 browser.exe 3012 browser.exe 3012 browser.exe 2836 browser.exe 3268 browser.exe 2552 browser.exe 2552 browser.exe 2896 browser.exe 2896 browser.exe 3476 browser.exe 3476 browser.exe 2488 browser.exe 2488 browser.exe 2756 browser.exe 1572 browser.exe 2984 browser.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
SEARCHBAND.EXEmsiexec.exedescription pid process Token: SeShutdownPrivilege 708 SEARCHBAND.EXE Token: SeIncreaseQuotaPrivilege 708 SEARCHBAND.EXE Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeSecurityPrivilege 960 msiexec.exe Token: SeCreateTokenPrivilege 708 SEARCHBAND.EXE Token: SeAssignPrimaryTokenPrivilege 708 SEARCHBAND.EXE Token: SeLockMemoryPrivilege 708 SEARCHBAND.EXE Token: SeIncreaseQuotaPrivilege 708 SEARCHBAND.EXE Token: SeMachineAccountPrivilege 708 SEARCHBAND.EXE Token: SeTcbPrivilege 708 SEARCHBAND.EXE Token: SeSecurityPrivilege 708 SEARCHBAND.EXE Token: SeTakeOwnershipPrivilege 708 SEARCHBAND.EXE Token: SeLoadDriverPrivilege 708 SEARCHBAND.EXE Token: SeSystemProfilePrivilege 708 SEARCHBAND.EXE Token: SeSystemtimePrivilege 708 SEARCHBAND.EXE Token: SeProfSingleProcessPrivilege 708 SEARCHBAND.EXE Token: SeIncBasePriorityPrivilege 708 SEARCHBAND.EXE Token: SeCreatePagefilePrivilege 708 SEARCHBAND.EXE Token: SeCreatePermanentPrivilege 708 SEARCHBAND.EXE Token: SeBackupPrivilege 708 SEARCHBAND.EXE Token: SeRestorePrivilege 708 SEARCHBAND.EXE Token: SeShutdownPrivilege 708 SEARCHBAND.EXE Token: SeDebugPrivilege 708 SEARCHBAND.EXE Token: SeAuditPrivilege 708 SEARCHBAND.EXE Token: SeSystemEnvironmentPrivilege 708 SEARCHBAND.EXE Token: SeChangeNotifyPrivilege 708 SEARCHBAND.EXE Token: SeRemoteShutdownPrivilege 708 SEARCHBAND.EXE Token: SeUndockPrivilege 708 SEARCHBAND.EXE Token: SeSyncAgentPrivilege 708 SEARCHBAND.EXE Token: SeEnableDelegationPrivilege 708 SEARCHBAND.EXE Token: SeManageVolumePrivilege 708 SEARCHBAND.EXE Token: SeImpersonatePrivilege 708 SEARCHBAND.EXE Token: SeCreateGlobalPrivilege 708 SEARCHBAND.EXE Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe Token: SeRestorePrivilege 960 msiexec.exe Token: SeTakeOwnershipPrivilege 960 msiexec.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
Processes:
Yandex.exesearchbandapp.exesearchbandapp64.exebrowser.exesearchbandapp64.exesearchbandapp64.exepid process 1972 Yandex.exe 1932 searchbandapp.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 3352 searchbandapp64.exe 3680 searchbandapp64.exe 3680 searchbandapp64.exe 3680 searchbandapp64.exe 3680 searchbandapp64.exe 3680 searchbandapp64.exe 3680 searchbandapp64.exe 3680 searchbandapp64.exe -
Suspicious use of SendNotifyMessage 48 IoCs
Processes:
searchbandapp.exesearchbandapp64.exebrowser.exesearchbandapp64.exesearchbandapp64.exepid process 1932 searchbandapp.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 1624 browser.exe 3352 searchbandapp64.exe 3680 searchbandapp64.exe 3680 searchbandapp64.exe 3680 searchbandapp64.exe 3680 searchbandapp64.exe 3680 searchbandapp64.exe 3680 searchbandapp64.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
Yandex.exesearchbandapp64.exebrowser.exesearchbandapp64.exepid process 1972 Yandex.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 364 searchbandapp64.exe 1624 browser.exe 3680 searchbandapp64.exe 3680 searchbandapp64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Yandex.exeYandex.exeybE995.tmpsetup.exesetup.exeservice_update.exeservice_update.exeservice_update.exedescription pid process target process PID 1972 wrote to memory of 1784 1972 Yandex.exe Yandex.exe PID 1972 wrote to memory of 1784 1972 Yandex.exe Yandex.exe PID 1972 wrote to memory of 1784 1972 Yandex.exe Yandex.exe PID 1972 wrote to memory of 1784 1972 Yandex.exe Yandex.exe PID 1972 wrote to memory of 1784 1972 Yandex.exe Yandex.exe PID 1972 wrote to memory of 1784 1972 Yandex.exe Yandex.exe PID 1972 wrote to memory of 1784 1972 Yandex.exe Yandex.exe PID 1784 wrote to memory of 1124 1784 Yandex.exe ybE995.tmp PID 1784 wrote to memory of 1124 1784 Yandex.exe ybE995.tmp PID 1784 wrote to memory of 1124 1784 Yandex.exe ybE995.tmp PID 1784 wrote to memory of 1124 1784 Yandex.exe ybE995.tmp PID 1784 wrote to memory of 1124 1784 Yandex.exe ybE995.tmp PID 1784 wrote to memory of 1124 1784 Yandex.exe ybE995.tmp PID 1784 wrote to memory of 1124 1784 Yandex.exe ybE995.tmp PID 1124 wrote to memory of 1636 1124 ybE995.tmp setup.exe PID 1124 wrote to memory of 1636 1124 ybE995.tmp setup.exe PID 1124 wrote to memory of 1636 1124 ybE995.tmp setup.exe PID 1124 wrote to memory of 1636 1124 ybE995.tmp setup.exe PID 1124 wrote to memory of 1636 1124 ybE995.tmp setup.exe PID 1124 wrote to memory of 1636 1124 ybE995.tmp setup.exe PID 1124 wrote to memory of 1636 1124 ybE995.tmp setup.exe PID 1636 wrote to memory of 1040 1636 setup.exe setup.exe PID 1636 wrote to memory of 1040 1636 setup.exe setup.exe PID 1636 wrote to memory of 1040 1636 setup.exe setup.exe PID 1636 wrote to memory of 1040 1636 setup.exe setup.exe PID 1636 wrote to memory of 1040 1636 setup.exe setup.exe PID 1636 wrote to memory of 1040 1636 setup.exe setup.exe PID 1636 wrote to memory of 1040 1636 setup.exe setup.exe PID 1040 wrote to memory of 2024 1040 setup.exe setup.exe PID 1040 wrote to memory of 2024 1040 setup.exe setup.exe PID 1040 wrote to memory of 2024 1040 setup.exe setup.exe PID 1040 wrote to memory of 2024 1040 setup.exe setup.exe PID 1040 wrote to memory of 2024 1040 setup.exe setup.exe PID 1040 wrote to memory of 2024 1040 setup.exe setup.exe PID 1040 wrote to memory of 2024 1040 setup.exe setup.exe PID 1040 wrote to memory of 1280 1040 setup.exe service_update.exe PID 1040 wrote to memory of 1280 1040 setup.exe service_update.exe PID 1040 wrote to memory of 1280 1040 setup.exe service_update.exe PID 1040 wrote to memory of 1280 1040 setup.exe service_update.exe PID 1040 wrote to memory of 1280 1040 setup.exe service_update.exe PID 1040 wrote to memory of 1280 1040 setup.exe service_update.exe PID 1040 wrote to memory of 1280 1040 setup.exe service_update.exe PID 1280 wrote to memory of 1956 1280 service_update.exe service_update.exe PID 1280 wrote to memory of 1956 1280 service_update.exe service_update.exe PID 1280 wrote to memory of 1956 1280 service_update.exe service_update.exe PID 1280 wrote to memory of 1956 1280 service_update.exe service_update.exe PID 1280 wrote to memory of 1956 1280 service_update.exe service_update.exe PID 1280 wrote to memory of 1956 1280 service_update.exe service_update.exe PID 1280 wrote to memory of 1956 1280 service_update.exe service_update.exe PID 1724 wrote to memory of 1940 1724 service_update.exe service_update.exe PID 1724 wrote to memory of 1940 1724 service_update.exe service_update.exe PID 1724 wrote to memory of 1940 1724 service_update.exe service_update.exe PID 1724 wrote to memory of 1940 1724 service_update.exe service_update.exe PID 1724 wrote to memory of 1940 1724 service_update.exe service_update.exe PID 1724 wrote to memory of 1940 1724 service_update.exe service_update.exe PID 1724 wrote to memory of 1940 1724 service_update.exe service_update.exe PID 1724 wrote to memory of 1552 1724 service_update.exe service_update.exe PID 1724 wrote to memory of 1552 1724 service_update.exe service_update.exe PID 1724 wrote to memory of 1552 1724 service_update.exe service_update.exe PID 1724 wrote to memory of 1552 1724 service_update.exe service_update.exe PID 1724 wrote to memory of 1552 1724 service_update.exe service_update.exe PID 1724 wrote to memory of 1552 1724 service_update.exe service_update.exe PID 1724 wrote to memory of 1552 1724 service_update.exe service_update.exe PID 1552 wrote to memory of 1576 1552 service_update.exe conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Yandex.exe"C:\Users\Admin\AppData\Local\Temp\Yandex.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Yandex.exe"C:\Users\Admin\AppData\Local\Temp\Yandex.exe" --parent-installer-process-id=1972 --run-as-admin --setup-cmd-line="fake_browser_arc --abt-config-resource-file=\"C:\Users\Admin\AppData\Local\Temp\abt_config_resource\" --abt-update-path=\"C:\Users\Admin\AppData\Local\Temp\7898dee0-d7d8-475a-bb05-97d062b1582b.tmp\" --brand-name=yandex --create-alice-shortcut-in-taskbar --distr-info-file=\"C:\Users\Admin\AppData\Local\Temp\distrib_info\" --make-browser-default-after-import --ok-button-pressed-time=598072400 --progress-window=327966 --send-statistics --variations-update-path=\"C:\Users\Admin\AppData\Local\Temp\9246d906-310d-4a7f-9345-0438e07774a9.tmp\" --verbose-logging"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ybE995.tmp"C:\Users\Admin\AppData\Local\Temp\ybE995.tmp" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\7898dee0-d7d8-475a-bb05-97d062b1582b.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --create-alice-shortcut-in-taskbar --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=107 --install-start-time-no-uac=598431200 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --ok-button-pressed-time=598072400 --progress-window=327966 --send-statistics --source=lite --variations-update-path="C:\Users\Admin\AppData\Local\Temp\9246d906-310d-4a7f-9345-0438e07774a9.tmp" --verbose-logging3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\BROWSER.PACKED.7Z" --searchband-file="C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\SEARCHBAND.EXE" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\7898dee0-d7d8-475a-bb05-97d062b1582b.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --create-alice-shortcut-in-taskbar --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=107 --install-start-time-no-uac=598431200 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --ok-button-pressed-time=598072400 --progress-window=327966 --send-statistics --source=lite --variations-update-path="C:\Users\Admin\AppData\Local\Temp\9246d906-310d-4a7f-9345-0438e07774a9.tmp" --verbose-logging4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\BROWSER.PACKED.7Z" --searchband-file="C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\SEARCHBAND.EXE" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\7898dee0-d7d8-475a-bb05-97d062b1582b.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --create-alice-shortcut-in-taskbar --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=107 --install-start-time-no-uac=598431200 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --ok-button-pressed-time=598072400 --progress-window=327966 --send-statistics --source=lite --variations-update-path="C:\Users\Admin\AppData\Local\Temp\9246d906-310d-4a7f-9345-0438e07774a9.tmp" --verbose-logging --verbose-logging --run-as-admin --target-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application" --child-setup-process --restart-as-admin-time=7088792005⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=a3028db1baffc0578427f8e443889a44 --annotation=main_process_pid=1040 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x1a4,0x1a8,0x1ac,0x178,0x1b0,0x11521d8,0x11521e8,0x11521f46⤵
- Executes dropped EXE
-
C:\Windows\TEMP\sdwra_1040_645297149\service_update.exe"C:\Windows\TEMP\sdwra_1040_645297149\service_update.exe" --setup6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --install7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids.xml"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source1040_363606559\Browser-bin\clids_yandex.xml"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=searchband --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=searchband --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source1040_363606559\Browser-bin\clids_searchband.xml"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\SEARCHBAND.EXE"C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\SEARCHBAND.EXE" /forcequiet6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --run-as-service1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=a3028db1baffc0578427f8e443889a44 --annotation=main_process_pid=1724 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x12c,0x130,0x134,0x100,0x138,0xec7ae8,0xec7af8,0xec7b042⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --update-scheduler2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --update-background-scheduler3⤵
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --statistics=https://api.browser.yandex.ru/installstats/send/dtype=stred/pid=457/cid=72992/path=extended_stat/vars=-action=version_folder_files_check_unused,-brand_id=unknown,-error=FONT_NOT_FOUND,-files_mask=33422687,-installer_type=service_audit,-launched=false,-old_style=0,-old_ver=,-result=0,-stage=error,-target=version_folder_files_check,-ui=0CFE9157_D66C_408D_83A7_39BE00776F32/*2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1890268446-10197398471120673084-1648162009-8549900681330881499507312438741583123"1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8EDC85C7DD24815E24FC1751E6295F912⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Installer\searchbandapp.exe"C:\Users\Admin\AppData\Local\Yandex\SearchBand\Installer\searchbandapp.exe" /install1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\searchbandapp64.exe"C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\searchbandapp64.exe" /auto2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\crashreporter64.exeC:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\crashreporter64.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\searchbandapp64.exe"C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.0.0.1903\searchbandapp64.exe" /update-check3⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.5.0.1923\searchbandapp64.exe"C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.5.0.1923\searchbandapp64.exe" /update-install4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.5.0.1923\searchbandapp64.exe"C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.5.0.1923\searchbandapp64.exe" /auto5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.5.0.1923\crashreporter64.exeC:\Users\Admin\AppData\Local\Yandex\SearchBand\Application\5.5.0.1923\crashreporter64.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --progress-window=327966 --ok-button-pressed-time=598072400 --install-start-time-no-uac=5984312001⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id= --annotation=main_process_pid=1624 --annotation=metrics_client_id=18c9c36178604aeca56c4d753af83687 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0xe4,0xe8,0xec,0xb8,0xf0,0x736ba3b0,0x736ba3c0,0x736ba3cc2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=816 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=1328 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Storage Service" --mojo-platform-channel-handle=1604 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=ru --service-sandbox-type=audio --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Audio Service" --mojo-platform-channel-handle=2036 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --enable-ignition --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2224 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --enable-ignition --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --mojo-platform-channel-handle=2300 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=2320 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --enable-ignition --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --mojo-platform-channel-handle=2532 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=2912 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=speechkit.mojom.Speechkit --lang=ru --service-sandbox-type=none --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Speechkit Service" --mojo-platform-channel-handle=2920 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --enable-ignition --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=2164 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\browser_diagnostics.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\browser_diagnostics.exe" --uninstall2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --enable-ignition --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=4136 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1520 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --enable-ignition --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --mojo-platform-channel-handle=4228 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --enable-ignition --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --mojo-platform-channel-handle=4488 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --enable-ignition --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=3760 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=2496 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=2616 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --enable-ignition --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=836 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --enable-ignition --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=1084 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=2768 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=2776 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=3468 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --enable-ignition --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --mojo-platform-channel-handle=1016 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4616 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4256 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4644 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=2508 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4820 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4656 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4632 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4776 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4692 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=2612 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=1068 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4704 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4732 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=556 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4796 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=3836 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4852 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4860 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4868 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4460 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4696 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=3276 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4456 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=4812 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=3988 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=4608 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1508 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1656 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=4768 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1052 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=2776 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1416 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1952 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1672 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1372 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1656 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=spell_checker.mojom.SpellChecker --lang=ru --service-sandbox-type=utility --utility-enable-offline-spellchecker --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Проверка правописания" --mojo-platform-channel-handle=816 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=2764 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1340 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=3728 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=autofill.mojom.TflPredictionsService --lang=ru --service-sandbox-type=utility --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Autofill Tfl Predictions" --mojo-platform-channel-handle=2736 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueTool\21.2.26.0\YandexRescueTool.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueTool\21.2.26.0\YandexRescueTool.exe" /uid:"e614a360-d977-49f6-9f21-aa49eea99753" /yandex_uid:"2450075271666035612" /version:"21.2.26.0" /lang:"ru" /browser:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" /iv:"1" /report_dir:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueToolReport" /browser_user_silent_detect /detect_report_html:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueToolReport\DetectReport.html"2⤵
-
C:\Users\Admin\AppData\Local\Temp\YandexRescueTool\bct.exe/session:L3VpZDplNjE0YTM2MC1kOTc3LTQ5ZjYtOWYyMS1hYTQ5ZWVhOTk3NTMgL3lhbmRleF91aWQ6MjQ1MDA3NTI3MTY2NjAzNTYxMiAvdmVyc2lvbjoyMS4yLjI2LjAgL2xhbmc6cnUgL2Jyb3dzZXI6QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxZYW5kZXhcWWFuZGV4QnJvd3NlclxBcHBsaWNhdGlvblxicm93c2VyLmV4ZSAvaXY6MSAvcmVwb3J0X2RpcjoiQzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxZYW5kZXhcWWFuZGV4QnJvd3NlclxVc2VyIERhdGFcUmVzY3VlVG9vbFJlcG9ydCIgL2Jyb3dzZXJfdXNlcl9zaWxlbnRfZGV0ZWN0IC9kZXRlY3RfcmVwb3J0X2h0bWw6IkM6XFVzZXJzXEFkbWluXEFwcERhdGFcTG9jYWxcWWFuZGV4XFlhbmRleEJyb3dzZXJcVXNlciBEYXRhXFJlc2N1ZVRvb2xSZXBvcnRcRGV0ZWN0UmVwb3J0Lmh0bWwiIC9icm93c2VyX2J1aWxkIC9ub19ndWkgL3NjYW5fbW9kZTpkZXRlY3QgL25vX2xhdW5jaF91YWMgL2NsaWQ6YnJvIC9wYXJlbnRfcGlkOjE3ODQ=3⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=hips_info_provider.mojom.HipsInfoProvider --lang=ru --service-sandbox-type=none --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name=hips_info_provider.mojom.HipsInfoProvider --mojo-platform-channel-handle=2216 --field-trial-handle=1164,i,15967994483433160798,7526734679582624011,131072 /prefetch:82⤵
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2581⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater --bits_job_guid={5D22A9DC-1453-4761-BB4B-F04AE3FE4F16}1⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666042804 --annotation=last_update_date=1666042804 --annotation=launches_after_update=1 --annotation=machine_id=a3028db1baffc0578427f8e443889a44 --annotation=main_process_pid=3932 --annotation=metrics_client_id=18c9c36178604aeca56c4d753af83687 --annotation=micromode=broupdater --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0xe8,0xec,0xf0,0xbc,0xf4,0x736ba3b0,0x736ba3c0,0x736ba3cc2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1228 --field-trial-handle=1276,i,16371796998355196369,10484465227848604660,131072 /prefetch:22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=1376 --field-trial-handle=1276,i,16371796998355196369,10484465227848604660,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater-stat-bits --broupdater-stat-name=install --bits_job_guid={91150ED6-5297-4E7E-9AA3-81499B9F7EA0}1⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666042804 --annotation=last_update_date=1666042804 --annotation=launches_after_update=2 --annotation=machine_id=a3028db1baffc0578427f8e443889a44 --annotation=main_process_pid=2320 --annotation=metrics_client_id=18c9c36178604aeca56c4d753af83687 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0xe8,0xec,0xf0,0xbc,0xf4,0x736ba3b0,0x736ba3c0,0x736ba3cc2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1224 --field-trial-handle=1284,i,14462319768625603578,1819610703727680310,131072 /prefetch:22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=1348 --field-trial-handle=1284,i,14462319768625603578,1819610703727680310,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater-stat-bits --broupdater-stat-name=dayuse --bits_job_guid={0E17590A-E18B-457E-9CD2-AC69865B735D}1⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666042804 --annotation=last_update_date=1666042804 --annotation=launches_after_update=2 --annotation=machine_id=a3028db1baffc0578427f8e443889a44 --annotation=main_process_pid=2552 --annotation=metrics_client_id=18c9c36178604aeca56c4d753af83687 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0xe8,0xec,0xf0,0xbc,0xf4,0x736ba3b0,0x736ba3c0,0x736ba3cc2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1228 --field-trial-handle=1320,i,6930147229403779840,18174134962678126979,131072 /prefetch:22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=E614A360-D977-49F6-9F21-AA49EEA99753 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=1348 --field-trial-handle=1320,i,6930147229403779840,18174134962678126979,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
1KB
MD5c378d9cb40499a87ee74979e98ad221a
SHA1566834dd4a7a72b6953892b19160c4c7e874521d
SHA256c070963a21a274f962a23ddae88c5c0393fb0483960d0b94b8eabd58b2ed5a66
SHA512f179dfd3b7043cdd7d5ca65934ed40e417142ad50f0e0589477680e6818b2f7e826e241822a2fe668eed3fc75332dafe978f1bf0da37f956fb46b6312499f8fa
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
1KB
MD5e3ebd38b9491fd401de6140c95370a49
SHA14c5898816fb2aad54e4a04c7f5aa6945e1ef39fe
SHA256e03138df0a29e2a432d9201e6c192c45d47be674827f9eafd25f2b29c9c1202a
SHA5121d4ffe6487012907b8606554359c02ff424e642a8c35e9c5045329a03fe3ce9c6eefbe90ce2be1e769224d93374b12ed007d36e085bf3aa290a186b3fbc57d6a
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
2KB
MD56ae1db4553f2d4a66c9834af04e4a6ed
SHA1ab37d3b23310f94ec38a28519f50dc845a2493c9
SHA2561cf7d84d4bcdd65e6bef54d08501fe796a5d9533cd6dd9f226d95df2d749ba8c
SHA512a263cd00872908dafacff6665b03cd2a4281fb2062ddf09231a7bf484fa3f072f797dd0efc74e9d56e5845f0eb16766846acb841d5c9ef1a530a3bbd1380490a
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
2KB
MD56ae1db4553f2d4a66c9834af04e4a6ed
SHA1ab37d3b23310f94ec38a28519f50dc845a2493c9
SHA2561cf7d84d4bcdd65e6bef54d08501fe796a5d9533cd6dd9f226d95df2d749ba8c
SHA512a263cd00872908dafacff6665b03cd2a4281fb2062ddf09231a7bf484fa3f072f797dd0efc74e9d56e5845f0eb16766846acb841d5c9ef1a530a3bbd1380490a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
1KB
MD5968706091b00f62e2ee54190fe913380
SHA17dcd60d17fc861a273074fc9c6652e6e0cc2c182
SHA256a51a7a851222d45c068ce2120e495b217f504b87d1a6d982feeeeb252d4aa80d
SHA512fb7521dab16a95317c88d31763e0eca697d040cee09c91fd59c59a12bfb8e8e2d12df75a7bf461ab99b08af58ebdf0be8ace473692357182d86ef3cbb19c2bdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2Filesize
1KB
MD50e770a2b0e01305dd71665b0cfdcf454
SHA19e3b745dc0392dd47a343df58f0f38eede6bca8b
SHA2565f2bb6c904b96792e09f33052fd72befc18a38cb78c036178dddd3b2e546f48d
SHA512f043f4c79f5e6631ffed876975dc527076459e14c3d59df10b8d1c12e06c8d3ed00cf6f5c96b92d48e7a01b2ee82e76e40da9f406327709d435faf0da88aeda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2Filesize
727B
MD53dc4181e96e768b9f4bbf41d1afa1dc1
SHA19ee79c2f26bf520c4e8a3b36daff9ce8e6e3cca8
SHA256a72e1936399b803b5c282aa625b1dd2e3c924897ba728887035ebd30a4e9eae4
SHA5128c6c6ec2b6513697995aac13b9f946a7f5442cea77d0d3053ae9cf0d7dedd6942c8eceabfcd0380156403002bea026b3b18d4926fec92a146faf41f0144a7958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBFilesize
471B
MD5da5a9f149955d936a31dc5e456666aac
SHA1195238d41c1e13448f349f43bb295ef2d55cb47a
SHA25679ac574c7c45144bb35b59ff79c78dc59b66592715dea01b389e3620db663224
SHA51260d7d1f5405470ba1e6b80066af2e78240acbea8db58b5a03660874605178aebaa9ce342ca97f17798109e7411e82466db5af064e39eaddc05410f2abe672f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
60KB
MD5d15aaa7c9be910a9898260767e2490e1
SHA12090c53f8d9fc3fbdbafd3a1e4dc25520eb74388
SHA256f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e
SHA5127e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
1KB
MD542198b52f6db40a5d0aeaeccb8d79ba2
SHA15619e78fc43bf2cb49fbfc6bdbf3f1625df166a4
SHA256f4301ed013980f23ee45db7e47cbced2a11d6820de70631a24189f5e0c918212
SHA51240dd68133c3e1dd2ca9fb708d511bac30fa6788c1401e498452d4110d9223a13fb8c023221c7e52a2eed6ecc9466ec3fa5900596db026119fe05c57043e91d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5C8CC0A7FE31816B4641D0465402560Filesize
1KB
MD5e94fb54871208c00df70f708ac47085b
SHA14efc31460c619ecae59c1bce2c008036d94c84b8
SHA2567b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df86
SHA5122e15b76e16264abb9f5ef417752a1cbb75f29c11f96ac7d73793172bd0864db65f2d2b7be0f16bbbe686068f0c368815525f1e39db5a0d6ca3ab18be6923b898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BBFilesize
727B
MD5e48b6e4b5351b7f68acc6375f58b4832
SHA1b17b7199b60c22b91a3df390d7a1c7874c7892a9
SHA256fed4553c22581ce3e71b78d3d45bddc8137beb99d2ff71a5423da909d6848d8c
SHA5125f3af281f1ec2292f0a0a905ad24a07c793c8e8ac0be9a0c86e9c1588b7f9cd6028c70433d7c228d60c7c9dbe1a1d3dd0afd3bf3795b388b6d48444edb1444b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
508B
MD596e080ba6f02b4002e8392d94f216ad0
SHA18b4a4599a0ecc43783b42abc0d39778a1e22e673
SHA25630b7408fc9e05ae902c394af7eadd0eb3a4b5b9cb82144169c0afa4b983470e1
SHA5120ff8381890ebe0074216d460866ead8c5c238512af665f75fd5c8c3163f4d2d6c092465876c9765237824828c6d88d45120af5856ab0c13de71ad2c585bad51e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2Filesize
536B
MD537a70c14116066825098e14f7de4c72d
SHA1ef5b1679f9ed85415c31c63152a88be47a057952
SHA2562a216b69af8d8096dbf458ffc2444ab2113beb3c6b37f542f7a1ecb81487cf75
SHA512dda3cacfb3d7286d6869bb7470f5eb2cf9644804fa20100f4e5ff240f96d34f97d9f20d3dba369cdcff1a0f0888850c5d731e9c6eb68d767d33e0ba732494d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2Filesize
434B
MD516e9f6ec8fc56d148de50ebac9def492
SHA1427a82683a013e9f33cc07ce42ffccd05f5e151c
SHA25698a60fd915e2abb37812375112596a3f518d1e4915c314effd7aface6cbbedd4
SHA512ec251756d6b994d18f4a481bb3acb4c9e16d708cc3ac092ef10a7d029f6ff53a72a90a5f77906a830620ffbd4a880c3e533c11f3bf39fba99c0ed79edc1ab75d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBFilesize
430B
MD5effc5c249f9d07e0c5877f636ac07cc0
SHA1e63cfc273cbbf191c0fee2fd66c21205a8dfc6fd
SHA25675d878d819828d529e0b9e1fdf51548aee7081175360775b3bab6596b4ccb3a0
SHA512f28c6b2bbf49d2a35679da4752c15352188b7f5a0f6baf1d42e596a179939040d5a16e078204b6bfdf14ef52ad4c3a6c5240c8e923c816b3ba83c474b4cd6a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD50b9cd0a924b430146e1eadab80ff1ede
SHA1e6b644fef6e44752b14cd73d37c8ac0f37613452
SHA256db8c3bc504c91bb354dfcf69a6c428c62f8db0984a6fc1c9ab7d4c814102b14a
SHA512b3f942651bee7300079c65551b46caec908e26b5fe05d42cfffe90fb7fd14508f38b2345442db00ba3fd6957db453ecd259178b28234fb168ad36b33cddd1fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
506B
MD5d091346400c51ceecf948274e799cb09
SHA10419d2ad2f29786573c5638018753ba6f0d3062d
SHA2565184861062ce1fba33dc21356fd4c48221cedc12856ca1fe74bc9bad318cf893
SHA512a19c8dbb75a30f723f10f202570ae25060ad1e87b62557697c19bb3b3023ab8bfd0deb5db26fb3198f49152c7d38b2be799ed9ba378a5823656de8788468f61e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560Filesize
264B
MD5648c2ad67c5e39e573583162ab0275c9
SHA1db37c54890892ffc582012794017018e8a7641b9
SHA25680f0ad9f4cf7e0735fd523b5d121ec0fac80cb73f73173197f8aecd7ce2d80c7
SHA5120dd4e0d9d4d92db81b161a08e34cbb40abff96f501d2a737d1192365055dc2011ab5bf53b039fe77938ceda3d0f14827cae5b491cb66035fdb55ead3639c08bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BBFilesize
442B
MD5c5db7ee3ec11bebc5d037c1a97214cfa
SHA1d8a580118c0f010399da90d1b56dd09cc84f95d4
SHA25651f71d1a5dbbed08c35ca3f3c879d09ab34cfe9d779327c6f28734182d59ff39
SHA512c2b8c25ce7046b4fe5a0990d60d7a348130806ad0c112057e73b95b7efcc4a46a90128e1320808c6b48a7121d9ee40989bd3f7b6b549e14f8b4585a11c8b83dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD507e8b58d9311f4cfb7aaa07cce177dfe
SHA1a472f60f550615261348de21ffc172ce9bd5c0f9
SHA2568dfbc663173605f06f94fd76b93513968ae9b03c8ca7fd78f69fae8e4c43d526
SHA5126671981dd64adf959b5198f693bc6808131cd6c1125fdfd67215f8a8aa40b0aebd012d948df9a13fa0b39d7bc5454249423b69d3f501c76f34d93c5dec0891b1
-
C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\BRAND_COMMONFilesize
23.3MB
MD5105d3263b0bca342b425fc45702c8856
SHA100180722d29af289bb7d2138a52b9d784ce367da
SHA2567547bc1f22cb361a4e644f899f8494faa013e15f05b75b77e1ea596532dc4fee
SHA512f6d3a7a25af1c10bbf5fb18b406f30c2c7d92778731f6b6d3eb6f181bc7854e920f99e1f55d2fdc0484bd1bd9bb13942ef13da85d1823c1f5cba16568cb45efb
-
C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\BROWSER.PACKED.7ZFilesize
90.8MB
MD55e99de825a34c299b8eef00c8d475e3d
SHA16fc1d9ef19f3d2aae0fb4ac596afbb24b408d83d
SHA2566f945efb7783b3ba9b8b48ffef9dc62322d11d51c401bbeaa1cf0aebf768b4ed
SHA512dd272ce4dd7f4529fb4b4a182cab7fa63bae0f455ea5bf843888c59d9fc13d1564b0f436b5afcd2c3d449979dcd82e0c71f45b6ae54e41e1ebbb649dd060e68a
-
C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\brand_yandexFilesize
2.1MB
MD5cff7f43a37e2081aa5271b2e42e20699
SHA19d50fec6b4b583e6b90cbc6906bb6838ded606d8
SHA25658ee5e657246dadd99f6194ffe082a27a8896aaa4500ff6773054a3929a912fd
SHA5124eb33ae0d9c9afb8116c9454b1ce06cefc6f59f21463ba9c04d45ed09b3fe61d1ef3aee1570e92d2657d4f6d33a603288f5ff5c04464bb6da75e16002763e2de
-
C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\distrib_infoFilesize
293B
MD55ff4663cf4ed5b1c4c7e84ae7a26484b
SHA1738deb4f237c34acab7ecf6a2899c7bd94ecd34a
SHA256f69eb6cd9983e819f7c1273598046ace4ef35c97cc651b89b460bb05dbd58c81
SHA512f9f7a15bd4d811d0a0a986d24b18d76434f89f81f6554cf0f707a0298a26f0732389e85394d186dd22a6c0306b8568c94d5583891196328e0e3945f44af59bbc
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
12KB
MD5b240782d3cefe14fdb03aa7cdd3d279b
SHA1ad9ab5c59e6cb65b276f468015c22ccba2cdfb70
SHA2564d589220ee800c9390a6ae986e9393b109f90acc7cc702ed3808f98ee6b1c321
SHA512a2665be7faab9db4880c391a2854098853f8e9eb24fe2b11da272ad88e49554d7165c046c1a0f5220ecd26a6cce1c905100d13fc7e7b341f0472eaf0b81fc2be
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
12KB
MD5c89b8b1837a0dd76aa6af6030cda4271
SHA11d42b83d5864e3e93f5e739e98018b7bd0037e02
SHA2564bdc58f61b68e544ccd61fe5dd25a5dd78566b8ec13cd598b76b7bdab0005c86
SHA512c0f3e7930037c0ac6a4d8312388c3aa154d554f5c1ef36fcef68af5e0ec0ac68f78c09f3e575ec9bee611ff8b07a0e94b9326346ed62782b8dc3a601aec9ed9d
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
26KB
MD5bb7801c21810f4d2133ed5c503615dbe
SHA1de0f11c01648d82f94a136963c9b4e2e64684839
SHA2562e71c225ab4dce40e84294e72fe5cb9f19e59a3e102be188cc61a6304851f172
SHA51226a310dc9b7640621c938b3fed3ab352f1b102a9fe3d8e074421a58d095abb7a69393dfaa5254b9fd03f9e1fd465bff90870d16ba8f0b23f35875e583b6f494b
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
26KB
MD59e463953d323bb78cb79d32033aefdfa
SHA109984e75889527a25df2e54a76719af68e21a48a
SHA25690b8945a2b848429fed29256a5fa65508f1dc06bef5170516814caeb70b12170
SHA512f67d9343082d12f3fc7785485966bdb7ddd2223c69a71f34fd2ee501ff48b5ec3fd7352ba817f02c8c61856909e20370ad86d1c5bc57683d46f8c41fb2e6aa31
-
C:\Users\Admin\AppData\Local\Temp\master_preferencesFilesize
129KB
MD5517cebb5d922c6be230ce63948323b5e
SHA142cdd2f94dd6258441645e831552fc609e801e44
SHA256fdd8fee19d1fb229f1bd4e6cdf703c69cda41278191165f337af6542c66847da
SHA512c43e59415c5d8f3d0a842f273326348cc3593226183285bf006c4772a21430907c675e50451e3d6f4c72bc3febff1d34a57654bd8bc6c8e59da1bcc6e84d6a6e
-
C:\Users\Admin\AppData\Local\Temp\master_preferencesFilesize
129KB
MD5517cebb5d922c6be230ce63948323b5e
SHA142cdd2f94dd6258441645e831552fc609e801e44
SHA256fdd8fee19d1fb229f1bd4e6cdf703c69cda41278191165f337af6542c66847da
SHA512c43e59415c5d8f3d0a842f273326348cc3593226183285bf006c4772a21430907c675e50451e3d6f4c72bc3febff1d34a57654bd8bc6c8e59da1bcc6e84d6a6e
-
C:\Users\Admin\AppData\Local\Temp\website.icoMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\yandex_browser_installer.logFilesize
5KB
MD5cbc16406fa3f4acd874da4631260193b
SHA131b18a415710c1d178ff038de85cb1f369824d81
SHA256f131eaae82f27b18b3936f722bb9929b6e42701df24b252a50a0b6415bda1f51
SHA512c0bf5c188a5ce8ac48d70385e7c30063f3710e493eddd98cdaf7c694f73080082f9dc00607cf127be4eb01f6ccb415b4c1af40935cef2a835e3fd24debbe7b86
-
C:\Users\Admin\AppData\Local\Temp\ybE995.tmpFilesize
149.8MB
MD5ff228e3e10f4d98d961e8a361861180d
SHA130fb83fafd7e79ed0ecd11a5231773d46a83e9f7
SHA256b64ea939b798557ffe48495520fb4a0e249a30d316cefc8c4ceca021b4b091ad
SHA5121763b1fc773aa4a3f6e34157751b7707467916ffee91d0ddf2096fe2bc5bffe677229de1ed35a47d35af4c25139d624189a8d5c418de8174126aef0f0bfc85e9
-
C:\Users\Admin\AppData\Local\Temp\ybE995.tmpFilesize
149.8MB
MD5ff228e3e10f4d98d961e8a361861180d
SHA130fb83fafd7e79ed0ecd11a5231773d46a83e9f7
SHA256b64ea939b798557ffe48495520fb4a0e249a30d316cefc8c4ceca021b4b091ad
SHA5121763b1fc773aa4a3f6e34157751b7707467916ffee91d0ddf2096fe2bc5bffe677229de1ed35a47d35af4c25139d624189a8d5c418de8174126aef0f0bfc85e9
-
C:\Users\Admin\AppData\Roaming\Yandex\uiFilesize
38B
MD5cac2050ca0e25b6375b04ff567624060
SHA1faa45c782c0ff60c711861045479acdf794c9181
SHA256023877cef08415e47bddec6765e9501cc48a5156fab3e1286cfa550dfa700b34
SHA512f864be041f57732aeace4a2288b5e65b96ece8331bbe76fa5b51343f671595a061aab3ddc6ec03619fc46d3d79e16d75dfe9f4d2e131e896d8a07fa1fd72ac61
-
C:\Windows\TEMP\sdwra_1040_645297149\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Windows\Temp\sdwra_1040_645297149\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
\Users\Admin\AppData\Local\Temp\YB_0EA16.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
\Users\Admin\AppData\Local\Temp\ybE995.tmpFilesize
149.8MB
MD5ff228e3e10f4d98d961e8a361861180d
SHA130fb83fafd7e79ed0ecd11a5231773d46a83e9f7
SHA256b64ea939b798557ffe48495520fb4a0e249a30d316cefc8c4ceca021b4b091ad
SHA5121763b1fc773aa4a3f6e34157751b7707467916ffee91d0ddf2096fe2bc5bffe677229de1ed35a47d35af4c25139d624189a8d5c418de8174126aef0f0bfc85e9
-
\Users\Admin\AppData\Local\Temp\ybE995.tmpFilesize
149.8MB
MD5ff228e3e10f4d98d961e8a361861180d
SHA130fb83fafd7e79ed0ecd11a5231773d46a83e9f7
SHA256b64ea939b798557ffe48495520fb4a0e249a30d316cefc8c4ceca021b4b091ad
SHA5121763b1fc773aa4a3f6e34157751b7707467916ffee91d0ddf2096fe2bc5bffe677229de1ed35a47d35af4c25139d624189a8d5c418de8174126aef0f0bfc85e9
-
\Users\Admin\AppData\Local\Temp\ybE995.tmpFilesize
149.8MB
MD5ff228e3e10f4d98d961e8a361861180d
SHA130fb83fafd7e79ed0ecd11a5231773d46a83e9f7
SHA256b64ea939b798557ffe48495520fb4a0e249a30d316cefc8c4ceca021b4b091ad
SHA5121763b1fc773aa4a3f6e34157751b7707467916ffee91d0ddf2096fe2bc5bffe677229de1ed35a47d35af4c25139d624189a8d5c418de8174126aef0f0bfc85e9
-
\Users\Admin\AppData\Local\Temp\ybE995.tmpFilesize
149.8MB
MD5ff228e3e10f4d98d961e8a361861180d
SHA130fb83fafd7e79ed0ecd11a5231773d46a83e9f7
SHA256b64ea939b798557ffe48495520fb4a0e249a30d316cefc8c4ceca021b4b091ad
SHA5121763b1fc773aa4a3f6e34157751b7707467916ffee91d0ddf2096fe2bc5bffe677229de1ed35a47d35af4c25139d624189a8d5c418de8174126aef0f0bfc85e9
-
\Windows\Temp\sdwra_1040_645297149\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
\Windows\Temp\sdwra_1040_645297149\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
\Windows\Temp\sdwra_1040_645297149\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
memory/108-163-0x0000000000000000-mapping.dmp
-
memory/364-161-0x0000000000000000-mapping.dmp
-
memory/556-148-0x0000000000000000-mapping.dmp
-
memory/572-165-0x00000000723A1000-0x00000000723A3000-memory.dmpFilesize
8KB
-
memory/708-152-0x0000000000000000-mapping.dmp
-
memory/864-150-0x0000000000000000-mapping.dmp
-
memory/960-154-0x000007FEFBD21000-0x000007FEFBD23000-memory.dmpFilesize
8KB
-
memory/1040-79-0x0000000000000000-mapping.dmp
-
memory/1100-199-0x0000000000000000-mapping.dmp
-
memory/1124-68-0x0000000000000000-mapping.dmp
-
memory/1280-113-0x0000000000000000-mapping.dmp
-
memory/1332-155-0x0000000000000000-mapping.dmp
-
memory/1424-964-0x0000000000000000-mapping.dmp
-
memory/1488-142-0x0000000000000000-mapping.dmp
-
memory/1552-136-0x0000000000000000-mapping.dmp
-
memory/1572-888-0x0000000000000000-mapping.dmp
-
memory/1576-138-0x0000000000000000-mapping.dmp
-
memory/1612-159-0x0000000000000000-mapping.dmp
-
memory/1628-201-0x0000000000000000-mapping.dmp
-
memory/1636-71-0x0000000000000000-mapping.dmp
-
memory/1744-144-0x0000000000000000-mapping.dmp
-
memory/1768-146-0x0000000000000000-mapping.dmp
-
memory/1784-56-0x0000000000000000-mapping.dmp
-
memory/1796-140-0x0000000000000000-mapping.dmp
-
memory/1940-129-0x0000000000000000-mapping.dmp
-
memory/1956-122-0x0000000000000000-mapping.dmp
-
memory/1972-54-0x0000000075501000-0x0000000075503000-memory.dmpFilesize
8KB
-
memory/1972-55-0x0000000074401000-0x0000000074403000-memory.dmpFilesize
8KB
-
memory/2024-85-0x0000000000000000-mapping.dmp
-
memory/2092-754-0x0000000000000000-mapping.dmp
-
memory/2212-238-0x0000000000000000-mapping.dmp
-
memory/2288-446-0x0000000000000000-mapping.dmp
-
memory/2332-409-0x0000000000000000-mapping.dmp
-
memory/2372-269-0x0000000000000000-mapping.dmp
-
memory/2436-485-0x0000000000000000-mapping.dmp
-
memory/2448-709-0x0000000000000000-mapping.dmp
-
memory/2488-878-0x0000000000000000-mapping.dmp
-
memory/2488-445-0x0000000000000000-mapping.dmp
-
memory/2536-308-0x0000000000000000-mapping.dmp
-
memory/2544-698-0x0000000000000000-mapping.dmp
-
memory/2752-1034-0x0000000000000000-mapping.dmp
-
memory/2752-341-0x0000000000000000-mapping.dmp
-
memory/2756-883-0x0000000000000000-mapping.dmp
-
memory/2764-555-0x0000000000000000-mapping.dmp
-
memory/2800-833-0x0000000000000000-mapping.dmp
-
memory/2836-793-0x0000000000000000-mapping.dmp
-
memory/2836-490-0x0000000000000000-mapping.dmp
-
memory/2892-376-0x0000000000000000-mapping.dmp
-
memory/2896-868-0x0000000000000000-mapping.dmp
-
memory/2952-521-0x0000000000000000-mapping.dmp
-
memory/2984-922-0x0000000000000000-mapping.dmp
-
memory/3004-933-0x0000000000000000-mapping.dmp
-
memory/3012-755-0x0000000000000000-mapping.dmp
-
memory/3068-995-0x0000000000000000-mapping.dmp
-
memory/3168-589-0x0000000000000000-mapping.dmp
-
memory/3176-699-0x0000000000000000-mapping.dmp
-
memory/3268-827-0x0000000000000000-mapping.dmp
-
memory/3288-1104-0x0000000000000000-mapping.dmp
-
memory/3292-744-0x0000000000000000-mapping.dmp
-
memory/3352-929-0x0000000000000000-mapping.dmp
-
memory/3372-1065-0x0000000000000000-mapping.dmp
-
memory/3376-623-0x0000000000000000-mapping.dmp
-
memory/3412-927-0x0000000000000000-mapping.dmp
-
memory/3476-869-0x0000000000000000-mapping.dmp
-
memory/3636-657-0x0000000000000000-mapping.dmp
-
memory/3680-931-0x0000000000000000-mapping.dmp
-
memory/3732-745-0x0000000000000000-mapping.dmp
-
memory/3948-663-0x0000000000000000-mapping.dmp