Resubmissions
17-10-2022 19:36
221017-ybkpeacgf7 1017-10-2022 17:27
221017-v1ye1scfdl 817-10-2022 14:10
221017-rg6qhacbgq 8Analysis
-
max time kernel
1572s -
max time network
1573s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
17-10-2022 19:36
Static task
static1
Behavioral task
behavioral1
Sample
Yandex.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Yandex.exe
Resource
win10-20220812-en
General
-
Target
Yandex.exe
-
Size
2.4MB
-
MD5
09bb3df23630c9111a5860cb96bde6ad
-
SHA1
217d78e392e7ef295596862175eb353977a85738
-
SHA256
e36891d982acaa5b12e27cf55fae3581e29dd0ef35d0dd98ae93296034b5177e
-
SHA512
8a216eac67b5d4bc54781a166cd48ab8a68e0b983fb346c14030eca060046fe7484f76fa4eb006164c5781684cad82f7d29afaf9514e70c81feffe70df402f31
-
SSDEEP
49152:CsEpJsMKSCZrcPEGuW9Q+iA5H5u8QeuL:CsEpuBZrcPEGuWMxt
Malware Config
Extracted
nymaim
45.15.156.54
85.31.46.167
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3920 1856 rundll32.exe -
Processes:
resource yara_rule behavioral2/memory/5820-11170-0x00000000010F0000-0x0000000001CC2000-memory.dmp evasion -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Setup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
yb8041.tmpsetup.exesetup.exesetup.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeexplorer.exeservice_update.exeexplorer.exeservice_update.exeYandex.exeexplorer.execlidmgr.execlidmgr.execlidmgr.execlidmgr.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exeDllHost.exebrowser.exepid process 4904 yb8041.tmp 3992 setup.exe 1960 setup.exe 1408 setup.exe 3620 service_update.exe 4248 service_update.exe 4672 service_update.exe 2560 service_update.exe 592 service_update.exe 224 explorer.exe 1920 service_update.exe 4960 explorer.exe 2892 service_update.exe 4244 Yandex.exe 2096 explorer.exe 948 clidmgr.exe 4016 clidmgr.exe 3256 clidmgr.exe 4732 clidmgr.exe 4948 browser.exe 2640 browser.exe 4044 browser.exe 4648 browser.exe 4844 browser.exe 5068 browser.exe 1320 browser.exe 1756 browser.exe 5076 browser.exe 3460 browser.exe 3796 browser.exe 4684 browser.exe 1188 browser.exe 1892 browser.exe 980 browser.exe 5028 browser.exe 1960 browser.exe 1164 browser.exe 4996 browser.exe 4168 browser.exe 3720 browser.exe 4884 browser.exe 1900 browser.exe 1156 browser.exe 4312 browser.exe 2812 browser.exe 3908 browser.exe 1268 browser.exe 4956 browser.exe 660 browser.exe 4244 browser.exe 2436 browser.exe 3104 browser.exe 5052 browser.exe 2648 browser.exe 4264 browser.exe 420 browser.exe 980 browser.exe 3732 browser.exe 1072 browser.exe 4544 browser.exe 3996 browser.exe 208 browser.exe 4656 DllHost.exe 1400 browser.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
Checks computer location settings 2 TTPs 27 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
browser.exekeygen-step-4.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exeexplorer.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exeYandex.exeexplorer.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation keygen-step-4.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation Yandex.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\International\Geo\Nation browser.exe -
Loads dropped DLL 64 IoCs
Processes:
browser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 4948 browser.exe 2640 browser.exe 4948 browser.exe 4948 browser.exe 4648 browser.exe 4044 browser.exe 4648 browser.exe 4044 browser.exe 4844 browser.exe 5068 browser.exe 4044 browser.exe 4044 browser.exe 4044 browser.exe 4044 browser.exe 4044 browser.exe 1320 browser.exe 4844 browser.exe 1756 browser.exe 5068 browser.exe 5076 browser.exe 3460 browser.exe 3796 browser.exe 4684 browser.exe 1320 browser.exe 1188 browser.exe 1756 browser.exe 5076 browser.exe 3460 browser.exe 3796 browser.exe 4684 browser.exe 1188 browser.exe 5028 browser.exe 1960 browser.exe 5028 browser.exe 1960 browser.exe 1164 browser.exe 5028 browser.exe 1164 browser.exe 4168 browser.exe 4996 browser.exe 4168 browser.exe 4996 browser.exe 4884 browser.exe 3720 browser.exe 4884 browser.exe 1900 browser.exe 1156 browser.exe 4312 browser.exe 2812 browser.exe 3908 browser.exe 1268 browser.exe 1900 browser.exe 4956 browser.exe 1156 browser.exe 660 browser.exe 4312 browser.exe 4244 browser.exe 2812 browser.exe 2436 browser.exe 3908 browser.exe 3104 browser.exe 1268 browser.exe 5052 browser.exe 4956 browser.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/5820-11101-0x00000000010F0000-0x0000000001CC2000-memory.dmp themida behavioral2/memory/5820-11170-0x00000000010F0000-0x0000000001CC2000-memory.dmp themida -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 34.142.181.181 -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
keygen-step-1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook keygen-step-1.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook keygen-step-1.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook keygen-step-1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
browser.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\YandexBrowserAutoLaunch_45886AE68CD319C7351FF54A1DBD4B87 = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --shutdown-if-not-closed-by-system-restart" browser.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
browser.exeSetup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA browser.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 227 api.ipify.org 228 api.ipify.org 301 ip-api.com -
Drops file in System32 directory 31 IoCs
Processes:
service_update.exebct.exesvchost.exebct.exeservice_update.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies service_update.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini bct.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini bct.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 service_update.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\_[1].js service_update.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A5A30D2D5B8032D4C2410405C9010C88 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\BOIR7PNN.cookie service_update.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Yandex\ui service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content service_update.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A5A30D2D5B8032D4C2410405C9010C88 svchost.exe File opened for modification C:\Windows\System32\GroupPolicy bct.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft service_update.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\BOIR7PNN.cookie service_update.exe File opened for modification C:\Windows\System32\GroupPolicy bct.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 service_update.exe File opened for modification C:\Windows\System32\Tasks\Event Viewer Snap-in Launcher (29762912) svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2 service_update.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Setup.exepid process 5820 Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost.exedescription pid process target process PID 1568 set thread context of 2308 1568 svchost.exe svchost.exe -
Drops file in Program Files directory 13 IoCs
Processes:
service_update.exemp3studios_91.exeservice_update.exedescription ioc process File opened for modification C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\debug.log service_update.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.png mp3studios_91.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.js mp3studios_91.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js mp3studios_91.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.js mp3studios_91.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.json mp3studios_91.exe File opened for modification C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe service_update.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.html mp3studios_91.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.js mp3studios_91.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.js mp3studios_91.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.js mp3studios_91.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js mp3studios_91.exe File created C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe service_update.exe -
Drops file in Windows directory 7 IoCs
Processes:
service_update.exeservice_update.exebrowser.exeMicrosoftEdge.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\Tasks\System update for Yandex Browser.job service_update.exe File created C:\Windows\Tasks\Update for Yandex Browser.job service_update.exe File created C:\Windows\Tasks\Repairing Yandex Browser update service.job service_update.exe File created C:\Windows\Tasks\Обновление Браузера Яндекс.job browser.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5516 4656 WerFault.exe loader.exe 5820 1744 WerFault.exe kakica.exe 5232 1744 WerFault.exe kakica.exe 5652 1744 WerFault.exe kakica.exe 5428 1744 WerFault.exe kakica.exe 5572 1744 WerFault.exe kakica.exe 3264 1744 WerFault.exe kakica.exe 5352 1744 WerFault.exe kakica.exe 6096 1744 WerFault.exe kakica.exe 4328 1744 WerFault.exe kakica.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
keygen-step-1.exesvchost.exeSetup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString keygen-step-1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 keygen-step-1.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 5788 schtasks.exe 3792 schtasks.exe 3916 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 4184 timeout.exe 5116 timeout.exe -
Enumerates system info in registry 2 TTPs 15 IoCs
Processes:
browser.exebrowser.exebrowser.exebrowser.exechrome.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 4476 taskkill.exe 5616 taskkill.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 33 IoCs
Processes:
svchost.exeservice_update.exeservice_update.exebrowser.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Yandex\UICreated_SYSTEM = "1" service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" service_update.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Yandex service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" service_update.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133105163297123241" browser.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix service_update.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry browser.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing service_update.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe -
Modifies registry class 64 IoCs
Processes:
setup.exeMicrosoftEdge.exeMicrosoftEdgeCP.exerundll32.exesvchost.exeMicrosoftEdgeCP.exebrowser.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexTIFF.3L4JZPOYEYU426USTYDBX6SBAY\ = "Yandex Browser TIFF Document" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\.tif\OpenWithProgids\YandexTIFF.3L4JZPOYEYU426USTYDBX6SBAY setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexJPEG.3L4JZPOYEYU426USTYDBX6SBAY\shell\open\command setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{33CFHFCE-3FFF-ANGF-WE13-A4CF2GFI0PAE}\1 = "2205" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{38QZTYWD-0JER-SGSC-ZI05-S7WC3FJB6BSZ}\7289246C77593EBF svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 801b4a3f72e2d801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\.shtml setup.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\.tiff\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexJPEG.3L4JZPOYEYU426USTYDBX6SBAY\ = "Yandex Browser JPEG Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\.infected\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\.jpg\OpenWithProgids\YandexJPEG.3L4JZPOYEYU426USTYDBX6SBAY setup.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\.png setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\.pdf\OpenWithProgids\YandexPDF.3L4JZPOYEYU426USTYDBX6SBAY setup.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexBrowser.crx\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\",0" setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$http://www.typepad.com/ MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexJPEG.3L4JZPOYEYU426USTYDBX6SBAY\DefaultIcon setup.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexWEBM.3L4JZPOYEYU426USTYDBX6SBAY\shell\open\command setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexWEBP.3L4JZPOYEYU426USTYDBX6SBAY\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-123" setup.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexXML.3L4JZPOYEYU426USTYDBX6SBAY\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexPDF.3L4JZPOYEYU426USTYDBX6SBAY setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\.png\OpenWithProgids\YandexPNG.3L4JZPOYEYU426USTYDBX6SBAY setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\SystemFileAssociations\.tiff\shell\image_search\Icon = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,0" browser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{33CFHFCE-3FFF-ANGF-WE13-A4CF2GFI0PAE} rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexJS.3L4JZPOYEYU426USTYDBX6SBAY\shell\open\command setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$Telligent MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexCRX.3L4JZPOYEYU426USTYDBX6SBAY\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexCSS.3L4JZPOYEYU426USTYDBX6SBAY\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\SystemFileAssociations\.webp\shell\image_search\command browser.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\SystemFileAssociations\.bmp\shell\image_search browser.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexHTML.3L4JZPOYEYU426USTYDBX6SBAY\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\SystemFileAssociations\.webp browser.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\SystemFileAssociations\.bmp browser.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\YandexJPEG.3L4JZPOYEYU426USTYDBX6SBAY\shell setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\.pdf\OpenWithProgids setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\FileVersion = "2016061511" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-087602 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\NextBrowserDataLogTime = f003da89a4e2d801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\.css\OpenWithProgids\YandexCSS.3L4JZPOYEYU426USTYDBX6SBAY setup.exe -
Processes:
browser.exeYandex.exesetup.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 browser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 Yandex.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 Yandex.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 1900000001000000100000005d1b8ff2c30f63f5b536edd400f7f9b40f0000000100000030000000c130bba37b8b350e89fd5ed76b4f78777feee220d3b9e729042bef6af46e8e4c1b252e32b3080c681bc9a8a1afdd0a3c0b000000010000004200000047006c006f00620061006c005300690067006e00200043006f006400650020005300690067006e0069006e006700200052006f006f007400200052003400350000006200000001000000200000007b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df8653000000010000001f000000301d301b060567810c010330123010060a2b0601040182373c0101030200c01400000001000000140000001f00bf46800afc7839b7a5b443d95650bbce963b1d00000001000000100000005467b0adde8d858e30ee517b1a19ecd909000000010000000c000000300a06082b060105050703030300000001000000140000004efc31460c619ecae59c1bce2c008036d94c84b8200000000100000076050000308205723082035aa00302010202107653feac75464893f5e5d74a483a4ef8300d06092a864886f70d01010c05003053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f7420523435301e170d3230303331383030303030305a170d3435303331383030303030305a3053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f742052343530820222300d06092a864886f70d01010105000382020f003082020a0282020100b62dc530dd7ae8ab903d0372b03a4b991661b2e5ffa5671d371ce57eec9383aa84f5a3439b98458ab863575d9b00880425e9f868924b82d84bc94a03f3a87f6a8f8a6127bda144d0fdf53f22c2a34f918db305b22882915dfb5988050b9706c298f82ca73324ee503a41ccf0a0b07b1d4dd2a8583896e9dff91b91bb8b102cd2c7431da20974a180af7be6330a0c596b8ebcf4ab5a977b7fae55fb84f080fe844cd7e2babdc475a16fbd61107444b29807e274abff68dc6c263ee91fe5e00487ad30d30c8d037c55b816705c24782025eb676788abba4e34986b7011de38cad4bea1c09ce1df1e0201d83be1674384b6cffc74b72f84a3bfba09373d676cb1455c1961ab4183f5ac1deb770d464773cebfbd9595ed9d2b8810fefa58e8a757e1b3cfa85ae907259b12c49e80723d93dc8c94df3b44e62680fcd2c303f08c0cd245d62ee78f989ee604ee426e677e42167162e704f960c664a1b69c81214e2bc66d689486c699747367317a91f2d48c796e7ca6bb7e466f4dc585122bcf9a224408a88537ce07615706171224c0c43173a1983557477e103a45d92da4519098a9a00737c4651aaa1c6b1677f7a797ec3f1930996f31fbea40b2e7d2c4fac9d0f050767459fa8d6d1732bef8e97e03f4e787759ad44a912c850313022b4280f2896a36cfc84ca0ce9ef8cb8dad16a7d3ded59b18a7c6923af18263f12e0e2464df0203010001a3423040300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e041604141f00bf46800afc7839b7a5b443d95650bbce963b300d06092a864886f70d01010c050003820201005e2bba749734445f764828408493ee016ee9a1b3d68025e67be4bc09913d0ffc76add7d43020bb8f60d091d61cf29cef781a2b943202c12496525202d0f3d1fcf29b396e99e11f8e43417d9a1e5bc95d9a84fc26e687f3747226ada41bd93d3b6a52a03c091e2f1e7bb333b445c7f7acb1af9360ad76aeb8b21578eb836aebffdb46ab24e5ee02fa901f59c02f5dd6b75da45c10b77253f8414eccfa781a254acafe85624361c3b437aa81d2f4d63a0fbd8d597e3047de2b6be72150335fd4679bd4b8679f3c279903ff85438e7312ca20cde861d5b166dc17d6396d0fdbcf2337a182894e1c6b3fd6a0cdaa079d3e4226aad70ceefa47bf1a527ed17581d3c98a62176d4f88a021a0263eaf6dd962301fe99828ae6e8dd58e4c726693808d2ae355c760679042565c22510fb3dc4e39ee4dddd91d7810543b6ed0976f03b51eb22373c612b29a64d0fc958524a8ffdfa1b0dc9140aedf0933abb9dd92b7f1cc91743b69eb67971b90bfe7c7a06f71bb57bfb78f5aed7a406a16cd80842d2fe102d4249443b315fc0c2b1bfd716ffccbbc75173a5e83d2c9b32f1bd59c8d7f54fe7e7ee456a387a79de1595294418f6d5bbe86959aff1a76dd40d2514a70b41f336323773fec271e59e40887ed34824a0f3ffea01dc1f56773458678f4aa29e92787c619dbc61314c33949874da097e06513f59d7756e9dab358c73af2c0cd82 Yandex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 5c0000000100000004000000001000001900000001000000100000002fe1f70bb05d7c92335bc5e05b984da60f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f63030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e814000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e20000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 browser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\SystemCertificates\CA\Certificates\CA7788C32DA1E4B7863A4FB57D00B55DDACBC7F9\Blob = 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 browser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef453000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 browser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 setup.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\SystemCertificates\CA\Certificates\CA7788C32DA1E4B7863A4FB57D00B55DDACBC7F9 browser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 browser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD browser.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 230 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
setup.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeexplorer.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 1960 setup.exe 1960 setup.exe 3620 service_update.exe 3620 service_update.exe 4248 service_update.exe 4248 service_update.exe 4672 service_update.exe 4672 service_update.exe 4672 service_update.exe 4672 service_update.exe 592 service_update.exe 592 service_update.exe 1920 service_update.exe 1920 service_update.exe 2892 service_update.exe 2892 service_update.exe 224 explorer.exe 224 explorer.exe 224 explorer.exe 224 explorer.exe 1960 setup.exe 1960 setup.exe 1960 setup.exe 1960 setup.exe 4948 browser.exe 4948 browser.exe 4648 browser.exe 4648 browser.exe 4044 browser.exe 4948 browser.exe 4948 browser.exe 4844 browser.exe 5068 browser.exe 1320 browser.exe 1756 browser.exe 1756 browser.exe 5076 browser.exe 3460 browser.exe 3796 browser.exe 4684 browser.exe 1188 browser.exe 5028 browser.exe 5028 browser.exe 1960 browser.exe 1960 browser.exe 1164 browser.exe 4168 browser.exe 4168 browser.exe 4996 browser.exe 4996 browser.exe 4884 browser.exe 1900 browser.exe 1156 browser.exe 4312 browser.exe 2812 browser.exe 3908 browser.exe 1268 browser.exe 4956 browser.exe 660 browser.exe 4244 browser.exe 2436 browser.exe 3104 browser.exe 5052 browser.exe 2648 browser.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
svchost.exepid process 2308 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
MicrosoftEdgeCP.exepid process 2364 MicrosoftEdgeCP.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
Processes:
chrome.exechrome.exepid process 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 5760 chrome.exe 5760 chrome.exe 5760 chrome.exe 5760 chrome.exe 5760 chrome.exe 5760 chrome.exe 5760 chrome.exe 5760 chrome.exe 5760 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
browser.exebrowser.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeDebugPrivilege 1892 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: 33 2212 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2212 AUDIODG.EXE Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe Token: SeCreatePagefilePrivilege 4948 browser.exe Token: SeShutdownPrivilege 4948 browser.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Yandex.exeexplorer.exeexplorer.exebrowser.exechrome.exepid process 2476 Yandex.exe 224 explorer.exe 2096 explorer.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
browser.exechrome.exechrome.exepid process 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4948 browser.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 4312 chrome.exe 5760 chrome.exe 5760 chrome.exe 5760 chrome.exe 5760 chrome.exe 5760 chrome.exe 5760 chrome.exe 5760 chrome.exe 5760 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
Yandex.exebrowser.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 2476 Yandex.exe 4948 browser.exe 6072 MicrosoftEdge.exe 2364 MicrosoftEdgeCP.exe 2364 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Yandex.exeYandex.exeyb8041.tmpsetup.exesetup.exeservice_update.exeservice_update.exeservice_update.exeexplorer.exeYandex.exebrowser.exedescription pid process target process PID 2476 wrote to memory of 3908 2476 Yandex.exe Yandex.exe PID 2476 wrote to memory of 3908 2476 Yandex.exe Yandex.exe PID 2476 wrote to memory of 3908 2476 Yandex.exe Yandex.exe PID 2476 wrote to memory of 4132 2476 Yandex.exe Yandex.exe PID 2476 wrote to memory of 4132 2476 Yandex.exe Yandex.exe PID 2476 wrote to memory of 4132 2476 Yandex.exe Yandex.exe PID 4132 wrote to memory of 4904 4132 Yandex.exe yb8041.tmp PID 4132 wrote to memory of 4904 4132 Yandex.exe yb8041.tmp PID 4132 wrote to memory of 4904 4132 Yandex.exe yb8041.tmp PID 4904 wrote to memory of 3992 4904 yb8041.tmp setup.exe PID 4904 wrote to memory of 3992 4904 yb8041.tmp setup.exe PID 4904 wrote to memory of 3992 4904 yb8041.tmp setup.exe PID 3992 wrote to memory of 1960 3992 setup.exe setup.exe PID 3992 wrote to memory of 1960 3992 setup.exe setup.exe PID 3992 wrote to memory of 1960 3992 setup.exe setup.exe PID 1960 wrote to memory of 1408 1960 setup.exe setup.exe PID 1960 wrote to memory of 1408 1960 setup.exe setup.exe PID 1960 wrote to memory of 1408 1960 setup.exe setup.exe PID 1960 wrote to memory of 3620 1960 setup.exe service_update.exe PID 1960 wrote to memory of 3620 1960 setup.exe service_update.exe PID 1960 wrote to memory of 3620 1960 setup.exe service_update.exe PID 3620 wrote to memory of 4248 3620 service_update.exe service_update.exe PID 3620 wrote to memory of 4248 3620 service_update.exe service_update.exe PID 3620 wrote to memory of 4248 3620 service_update.exe service_update.exe PID 4672 wrote to memory of 2560 4672 service_update.exe service_update.exe PID 4672 wrote to memory of 2560 4672 service_update.exe service_update.exe PID 4672 wrote to memory of 2560 4672 service_update.exe service_update.exe PID 4672 wrote to memory of 592 4672 service_update.exe service_update.exe PID 4672 wrote to memory of 592 4672 service_update.exe service_update.exe PID 4672 wrote to memory of 592 4672 service_update.exe service_update.exe PID 1960 wrote to memory of 224 1960 setup.exe explorer.exe PID 1960 wrote to memory of 224 1960 setup.exe explorer.exe PID 1960 wrote to memory of 224 1960 setup.exe explorer.exe PID 592 wrote to memory of 1920 592 service_update.exe service_update.exe PID 592 wrote to memory of 1920 592 service_update.exe service_update.exe PID 592 wrote to memory of 1920 592 service_update.exe service_update.exe PID 224 wrote to memory of 4960 224 explorer.exe explorer.exe PID 224 wrote to memory of 4960 224 explorer.exe explorer.exe PID 224 wrote to memory of 4960 224 explorer.exe explorer.exe PID 4672 wrote to memory of 2892 4672 service_update.exe service_update.exe PID 4672 wrote to memory of 2892 4672 service_update.exe service_update.exe PID 4672 wrote to memory of 2892 4672 service_update.exe service_update.exe PID 1960 wrote to memory of 4244 1960 setup.exe Yandex.exe PID 1960 wrote to memory of 4244 1960 setup.exe Yandex.exe PID 1960 wrote to memory of 4244 1960 setup.exe Yandex.exe PID 4244 wrote to memory of 2096 4244 Yandex.exe explorer.exe PID 4244 wrote to memory of 2096 4244 Yandex.exe explorer.exe PID 4244 wrote to memory of 2096 4244 Yandex.exe explorer.exe PID 1960 wrote to memory of 948 1960 setup.exe clidmgr.exe PID 1960 wrote to memory of 948 1960 setup.exe clidmgr.exe PID 1960 wrote to memory of 948 1960 setup.exe clidmgr.exe PID 1960 wrote to memory of 4016 1960 setup.exe clidmgr.exe PID 1960 wrote to memory of 4016 1960 setup.exe clidmgr.exe PID 1960 wrote to memory of 4016 1960 setup.exe clidmgr.exe PID 1960 wrote to memory of 3256 1960 setup.exe clidmgr.exe PID 1960 wrote to memory of 3256 1960 setup.exe clidmgr.exe PID 1960 wrote to memory of 3256 1960 setup.exe clidmgr.exe PID 1960 wrote to memory of 4732 1960 setup.exe clidmgr.exe PID 1960 wrote to memory of 4732 1960 setup.exe clidmgr.exe PID 1960 wrote to memory of 4732 1960 setup.exe clidmgr.exe PID 4948 wrote to memory of 2640 4948 browser.exe browser.exe PID 4948 wrote to memory of 2640 4948 browser.exe browser.exe PID 4948 wrote to memory of 2640 4948 browser.exe browser.exe PID 4948 wrote to memory of 4044 4948 browser.exe browser.exe -
outlook_office_path 1 IoCs
Processes:
keygen-step-1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook keygen-step-1.exe -
outlook_win_path 1 IoCs
Processes:
keygen-step-1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook keygen-step-1.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exeC:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe2⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Event Viewer Snap-in Launcher (29762912)" /tr "C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe"3⤵
- Creates scheduled task(s)
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
C:\Users\Admin\AppData\Local\Temp\Yandex.exe"C:\Users\Admin\AppData\Local\Temp\Yandex.exe"1⤵
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Yandex.exe"C:\Users\Admin\AppData\Local\Temp\Yandex.exe" --check-the-interface2⤵
-
C:\Users\Admin\AppData\Local\Temp\Yandex.exe"C:\Users\Admin\AppData\Local\Temp\Yandex.exe" --parent-installer-process-id=2476 --run-as-admin --setup-cmd-line="fake_browser_arc --abt-config-resource-file=\"C:\Users\Admin\AppData\Local\Temp\abt_config_resource\" --abt-update-path=\"C:\Users\Admin\AppData\Local\Temp\41980fe7-0bc6-48e3-beb6-c34bfe7f02c2.tmp\" --brand-name=yandex --distr-info-file=\"C:\Users\Admin\AppData\Local\Temp\distrib_info\" --ok-button-pressed-time=415856706 --progress-window=458834 --send-statistics --the-interface-availability=150630000 --variations-update-path=\"C:\Users\Admin\AppData\Local\Temp\9c475d6e-a4f3-4819-b1f9-e09f6a2d229e.tmp\" --verbose-logging"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\yb8041.tmp"C:\Users\Admin\AppData\Local\Temp\yb8041.tmp" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\41980fe7-0bc6-48e3-beb6-c34bfe7f02c2.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=33 --install-start-time-no-uac=416825454 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --ok-button-pressed-time=415856706 --progress-window=458834 --send-statistics --source=lite --the-interface-availability=150630000 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\9c475d6e-a4f3-4819-b1f9-e09f6a2d229e.tmp" --verbose-logging3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\BROWSER.PACKED.7Z" --searchband-file="C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\SEARCHBAND.EXE" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\41980fe7-0bc6-48e3-beb6-c34bfe7f02c2.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=33 --install-start-time-no-uac=416825454 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --ok-button-pressed-time=415856706 --progress-window=458834 --send-statistics --source=lite --the-interface-availability=150630000 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\9c475d6e-a4f3-4819-b1f9-e09f6a2d229e.tmp" --verbose-logging4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\BROWSER.PACKED.7Z" --searchband-file="C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\SEARCHBAND.EXE" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\41980fe7-0bc6-48e3-beb6-c34bfe7f02c2.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=33 --install-start-time-no-uac=416825454 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --ok-button-pressed-time=415856706 --progress-window=458834 --send-statistics --source=lite --the-interface-availability=150630000 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\9c475d6e-a4f3-4819-b1f9-e09f6a2d229e.tmp" --verbose-logging --verbose-logging --run-as-admin --target-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application" --child-setup-process --restart-as-admin-time=4447413435⤵
- Executes dropped EXE
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=1960 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x304,0x308,0x30c,0x2e0,0x310,0x6421d8,0x6421e8,0x6421f46⤵
- Executes dropped EXE
-
C:\Windows\TEMP\sdwra_1960_100543684\service_update.exe"C:\Windows\TEMP\sdwra_1960_100543684\service_update.exe" --setup6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --install7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1960_2024377228\explorer.exe"C:\Users\Admin\AppData\Local\Temp\scoped_dir1960_2024377228\explorer.exe" --pttw1="C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yandex.lnk"6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1960_2024377228\explorer.exeC:\Users\Admin\AppData\Local\Temp\scoped_dir1960_2024377228\explorer.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=224 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x290,0x294,0x298,0x26c,0x29c,0x10e21d8,0x10e21e8,0x10e21f47⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\pin\explorer.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent /pin-path="C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.lnk" --is-pinning7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids.xml"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source1960_345391510\Browser-bin\clids_yandex.xml"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=searchband --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=searchband --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source1960_345391510\Browser-bin\clids_searchband.xml"6⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --run-as-service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=4672 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x617ae8,0x617af8,0x617b042⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --update-scheduler2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --update-background-scheduler3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --statistics=https://api.browser.yandex.ru/installstats/send/dtype=stred/pid=457/cid=72992/path=extended_stat/vars=-action=version_folder_files_check_unused,-brand_id=unknown,-error=FONT_NOT_FOUND,-files_mask=66977119,-installer_type=service_audit,-launched=false,-old_style=0,-old_ver=,-result=0,-stage=error,-target=version_folder_files_check,-ui=0C94D5DE_0365_44BA_890D_90CAE3061C52/*2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --progress-window=458834 --ok-button-pressed-time=415856706 --install-start-time-no-uac=4168254541⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id= --annotation=main_process_pid=4948 --annotation=metrics_client_id=6bf0c1057e94498eb4ab2473e0defe98 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x154,0x158,0x15c,0x130,0x160,0x715da3b0,0x715da3c0,0x715da3cc2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=1880 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Storage Service" --mojo-platform-channel-handle=2164 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=ru --service-sandbox-type=audio --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Audio Service" --mojo-platform-channel-handle=2600 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --mojo-platform-channel-handle=3396 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Video Capture" --mojo-platform-channel-handle=3712 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=3748 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=3816 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --mojo-platform-channel-handle=3824 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=3836 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=4024 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\browser_diagnostics.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\browser_diagnostics.exe" --uninstall2⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=4000 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=speechkit.mojom.Speechkit --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Speechkit Service" --mojo-platform-channel-handle=4820 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=5576 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --mojo-platform-channel-handle=6296 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=5772 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=5616 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=3388 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=4032 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6572 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5936 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6752 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4236 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6364 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4576 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6784 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6848 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6892 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6884 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6348 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6044 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6876 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4460 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=3880 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6932 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6944 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6956 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4568 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6688 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6356 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7048 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7052 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --mojo-platform-channel-handle=3600 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --mojo-platform-channel-handle=8484 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=6740 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=6760 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=7548 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --mojo-platform-channel-handle=7460 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=8992 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=6368 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --mojo-platform-channel-handle=8756 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=4240 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 --enable-elf-protection /prefetch:22⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --mojo-platform-channel-handle=4936 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=56 --mojo-platform-channel-handle=8588 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=5188 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=6588 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=4456 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=6684 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=8220 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1760 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=3124 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=64 --mojo-platform-channel-handle=3936 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=65 --mojo-platform-channel-handle=7552 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=66 --mojo-platform-channel-handle=7312 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=67 --mojo-platform-channel-handle=7828 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=5412 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=7680 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=spell_checker.mojom.SpellChecker --lang=ru --service-sandbox-type=utility --utility-enable-offline-spellchecker --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Проверка правописания" --mojo-platform-channel-handle=5248 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=71 --mojo-platform-channel-handle=8776 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=7176 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=8032 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=4492 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=file_rating.mojom.FileRating --lang=ru --service-sandbox-type=utility --utility-enable-file-rating --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="File Rating Service" --mojo-platform-channel-handle=6488 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=76 --mojo-platform-channel-handle=3880 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Quarantine Service" --mojo-platform-channel-handle=8080 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=5516 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=deep_links_provider.mojom.DeepLinksProvider --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="DeepLinks service" --mojo-platform-channel-handle=8220 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=deep_links_provider.mojom.DeepLinksProvider --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="DeepLinks service" --mojo-platform-channel-handle=3816 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=81 --mojo-platform-channel-handle=8632 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=82 --mojo-platform-channel-handle=5888 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueTool\21.2.26.0\YandexRescueTool.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueTool\21.2.26.0\YandexRescueTool.exe" /uid:"895ba639-9815-4a3f-b7bb-0b6784e51da7" /yandex_uid:"9695090311666035513" /version:"21.2.26.0" /lang:"ru" /browser:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" /iv:"1" /report_dir:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueToolReport" /browser_user_gui_detect_cure2⤵
-
C:\Users\Admin\AppData\Local\Temp\YandexRescueTool\bct.exe/session:L3VpZDo4OTViYTYzOS05ODE1LTRhM2YtYjdiYi0wYjY3ODRlNTFkYTcgL3lhbmRleF91aWQ6OTY5NTA5MDMxMTY2NjAzNTUxMyAvdmVyc2lvbjoyMS4yLjI2LjAgL2xhbmc6cnUgL2Jyb3dzZXI6QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxZYW5kZXhcWWFuZGV4QnJvd3NlclxBcHBsaWNhdGlvblxicm93c2VyLmV4ZSAvaXY6MSAvcmVwb3J0X2RpcjoiQzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxZYW5kZXhcWWFuZGV4QnJvd3NlclxVc2VyIERhdGFcUmVzY3VlVG9vbFJlcG9ydCIgL2Jyb3dzZXJfdXNlcl9ndWlfZGV0ZWN0X2N1cmUgL2Jyb3dzZXJfYnVpbGQgL2NsaWQ6YnJvIC9wYXJlbnRfcGlkOjUyODg=3⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=deep_links_provider.mojom.DeepLinksProvider --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="DeepLinks service" --mojo-platform-channel-handle=6132 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5748 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7596 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=8136 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7848 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7916 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=8252 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7336 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=8932 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=8108 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5884 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5932 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=8464 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=8304 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7352 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7328 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7764 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=3784 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=696 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7024 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5504 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7032 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7012 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7000 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=107 --mojo-platform-channel-handle=6972 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7128 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7116 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7040 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=112 --mojo-platform-channel-handle=10420 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=deep_links_provider.mojom.DeepLinksProvider --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="DeepLinks service" --mojo-platform-channel-handle=5964 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=113 --mojo-platform-channel-handle=11260 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=114 --mojo-platform-channel-handle=10776 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=115 --mojo-platform-channel-handle=4432 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=file_rating.mojom.FileRating --lang=ru --service-sandbox-type=utility --utility-enable-file-rating --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="File Rating Service" --mojo-platform-channel-handle=10560 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Quarantine Service" --mojo-platform-channel-handle=10936 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=proxy_resolver.mojom.ProxyResolverFactory --lang=ru --service-sandbox-type=service --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name=Прокси-сервер V8 --mojo-platform-channel-handle=11632 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=deep_links_provider.mojom.DeepLinksProvider --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="DeepLinks service" --mojo-platform-channel-handle=10520 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueTool\21.2.26.0\YandexRescueTool.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueTool\21.2.26.0\YandexRescueTool.exe" /uid:"895ba639-9815-4a3f-b7bb-0b6784e51da7" /yandex_uid:"9695090311666035513" /version:"21.2.26.0" /lang:"ru" /browser:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" /iv:"1" /report_dir:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueToolReport" /browser_user_silent_detect /detect_report_html:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueToolReport\DetectReport.html"2⤵
-
C:\Users\Admin\AppData\Local\Temp\YandexRescueTool\bct.exe/session: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3⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=hips_info_provider.mojom.HipsInfoProvider --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name=hips_info_provider.mojom.HipsInfoProvider --mojo-platform-channel-handle=6284 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=deep_links_provider.mojom.DeepLinksProvider --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="DeepLinks service" --mojo-platform-channel-handle=6032 --field-trial-handle=1804,i,7213460759604548102,11324356421450068966,131072 /prefetch:82⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater --bits_job_guid={3C7245C4-17CB-409D-805C-73826A8296A6}2⤵
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666042701 --annotation=last_update_date=1666042701 --annotation=launches_after_update=1 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=3736 --annotation=metrics_client_id=6bf0c1057e94498eb4ab2473e0defe98 --annotation=micromode=broupdater --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x144,0x148,0x14c,0xdc,0x150,0x715da3b0,0x715da3c0,0x715da3cc3⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1716 --field-trial-handle=1812,i,14426076544257801539,708458358834726337,131072 /prefetch:23⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=2036 --field-trial-handle=1812,i,14426076544257801539,708458358834726337,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater-stat-bits --broupdater-stat-name=install --bits_job_guid={2DE6BFEB-B297-4370-B552-BF0F701DE2A9}2⤵
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666042701 --annotation=last_update_date=1666042701 --annotation=launches_after_update=1 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=68 --annotation=metrics_client_id=6bf0c1057e94498eb4ab2473e0defe98 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x150,0x154,0x158,0x12c,0x15c,0x715da3b0,0x715da3c0,0x715da3cc3⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1696 --field-trial-handle=1808,i,1013262469609655708,13680166608806335824,131072 /prefetch:23⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=2000 --field-trial-handle=1808,i,1013262469609655708,13680166608806335824,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater-stat-bits --broupdater-stat-name=dayuse --bits_job_guid={39E57277-9C7E-4DE8-8879-BCC07CAF9D30}2⤵
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666042701 --annotation=last_update_date=1666042701 --annotation=launches_after_update=1 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=340 --annotation=metrics_client_id=6bf0c1057e94498eb4ab2473e0defe98 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x140,0x144,0x148,0x120,0x14c,0x715da3b0,0x715da3c0,0x715da3cc3⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1636 --field-trial-handle=1820,i,8839357868387071313,14284891314578213338,131072 /prefetch:23⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=895BA639-9815-4A3F-B7BB-0B6784E51DA7 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=288 --field-trial-handle=1820,i,8839357868387071313,14284891314578213338,131072 /prefetch:83⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k WspService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3a01⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Executes dropped EXE
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\Temp2_Sprint.Finereader.5.0.Office.keygen.by.CORE.zip\Sprint.Finereader.5.0.Office.keygen.by.CORE.exe"C:\Users\Admin\AppData\Local\Temp\Temp2_Sprint.Finereader.5.0.Office.keygen.by.CORE.zip\Sprint.Finereader.5.0.Office.keygen.by.CORE.exe"1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\License Keys.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\License Keys.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\License Keys.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\License Keys.exe" -q5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\KiffAppE2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\KiffAppE2.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\mp3studios_91.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\mp3studios_91.exe"4⤵
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xdc,0xe0,0xe4,0xb8,0xe8,0x7ffa88564f50,0x7ffa88564f60,0x7ffa88564f706⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1672 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2328 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2604 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2580 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1620 /prefetch:26⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4424 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4576 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4712 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5272 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5468 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5524 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4560 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:16⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1360 /prefetch:86⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,14585592104336143277,7993479846773412890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:86⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\pb1119.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\pb1119.exe"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start /min cmd /c del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\pb1119.exe" aeg222g5225⤵
-
C:\Windows\system32\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\pb1119.exe" aeg222g5226⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Users\Admin\AppData\Roaming\loader.exe"C:\Users\Admin\AppData\Roaming\loader.exe"5⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Event Viewer Snap-in Launcher (29762912)" /tr "C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "Event Viewer Snap-in Launcher (29762912)"6⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /tn "Event Viewer Snap-in Launcher (29762912)" /XML "C:\Users\Admin\AppData\Roaming\EventViewer\tfnme73946158264.tmp"6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 5806⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 5 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"5⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 56⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\kakica.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\kakica.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 5245⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 7925⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 8365⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 8725⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 9765⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 9485⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 11445⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 11565⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 13125⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "kakica.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\RarSFX1\kakica.exe" & exit5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "kakica.exe" /f6⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "keygen-step-1.exe"4⤵
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Modifies registry class
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa97914f50,0x7ffa97914f60,0x7ffa97914f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1348 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2344 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2328 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1892 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3728 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4572 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4712 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4844 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3720 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2344 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2468 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5412 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5544 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1584,11620359133671116969,9980068132090903660,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
9KB
MD50dae39343f8c6c7e6275a8042300a0fd
SHA118a71e56197ad0317ed1e608918e1a67a473f1c0
SHA2561fe8cf7ac552807d3cbaf8713f334b7ea61378340342f6283f815badb5519765
SHA51275d789ccb77817d010fa7b4c67086301768feffb7f6145d5573cc9695cf64bae684697e18cb74332b0e1190791c2641d7c88fef25e6d87ec502f986120cb9398
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
451B
MD5d50425d76e36932a48c23cdc09ebe36f
SHA18a58c182599af081c3541a9b524913d8e5446b8c
SHA2562b56d016cbeb670692fe2600a673150903d4161c29bdcedc7a37c5bb29d99ce7
SHA512b609515d1e0772f2cd9214f0a3654f9fef8b9854325821e4a4f103b3c991345fe845fd279576dc89ccddd8cfe1aaf5b872224e04ff2bffc4484c62a3761f3a74
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
1KB
MD5a6af70e46aa2399202074a2d6a5b7d55
SHA16e6eaa5695783c520b83c0139a9b25a8a33327a4
SHA25622e2b604df384b596d0d5214f908de39a59d0ca431e5c4908f2dcbc927fb56f5
SHA512a4b9ec1317ad7b6ae185b71d9aced9eb396d0315a398c9c60a9f315b8018203e2d27b2cc9b828d898e8aa9b6363cf84cb24bda8019856d8c3d02b29f7b1b429c
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
2KB
MD5bdfa375fc9d186deb28177f9945f36ba
SHA107d3025928a8e03fb214d34290d30336f97a22f1
SHA256a7838716fec9acf77f800da779c9027d9517622f99d49b180cea6f275f452393
SHA512a30c0245366058144d8da63e63bde47fdf4390f4ed274528fdc613b7c26bce2cd06ab58f1ce31c1d10aea3614dbae68459a6c4d1c07f7bcb0bb4d45651df0548
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
2KB
MD5363ca7067d2d29b0ed3d9011360f8ccc
SHA19541a11293d11c1173863d680bf252588dd1b1b6
SHA2563a25e5d2e8a461de85b17574182aab6bf8d3603921fbd76c10b518a6e412017e
SHA5125e4827bc7e556a47ba00d74a56a43d90f1a4bd9ee40400c5a6bdc373dcebb1a162c13550aec9fa5d26970f13bab83d203c1aa7b4c9bbdf8fddfcff63e99ef76f
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
3KB
MD5d56a21a02e646d2c69ccdefccb9214bd
SHA1b28a03951a1b5e45052cdcf87e00420ed5ec1e5e
SHA25680dd5ae4b368f148eccb259bdeb7408be51106b7eebf15eea031721b50f4e37f
SHA5123be54662fe745912ea4792cf538a1d358ee7977ec13b8560ba21e64075cb00359a396f71bfef82dd492af6afc640b2f67feb152567fcd36d07fbb35ed0a87eba
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
3KB
MD5bdc4a36bd916b35b15034cc9b1f6debd
SHA16550b927ff82a4677ec3a59ac8895d0b012b04a0
SHA256c9e0b10f80d634358912069f6a65612c75db20a607c2c07b9cb5e5ecdc0a47f1
SHA512fe13fbbb9e44acbae8e90fbb957a4da990614d4f59a61382f871da0e8ab2efdf43e2614a21d63856da2538ec2f3b88526662b895337c33a568f5dba5c5f381b5
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
5KB
MD5f562b34d5615d482bdfcf8ebcf3ed1ea
SHA10a219490cbe4356aee820ad13a199f62a49201ed
SHA256241361df6902b8dbcb72e7e957a4a1e275ff875eb2b65b8a94dcb8fbbfca6a71
SHA5126c860bc610ed429aab64b62d8a86d54f527e4cae4abe4d0a2f8ed6727ebf65a296659d6068e9f01bdbf32850daf6288fb456a38c38b5e3ef9c7406b140092b0c
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
8KB
MD54e13d95dafb9d5229f087dcc7619f1b7
SHA1bda1d19b15571d7590ca5223e5a62de8fa0bd928
SHA2569ef1578794e88fb0588e80029dc917bd876e8f70258e564ce4b0afca3c164407
SHA5125c8baedf478f0d39b93f96b4053f214ef46170041a80df6b9c18bc58b32ba56cda92179014ddc715ee914f6c29ffc412119ac4f88dc072b4f015f1cc54d9168d
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
8KB
MD5b14573cd2fc2f8296a3c517766553b18
SHA12c26de2d36a333fd10fc1484f13518e4a1dade1c
SHA256e0ca5c9029d6fbe1fa055149158c1a008c756618dbb0aab9b2f0fe49757f558e
SHA512494d9dc434adb56fc98b09880ef0247957b9d14ad481b815f22047336c7df1936e2e83786d2a4e05154ef201774b248db7e541628621a6d2f4f29cf7aba600e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
1KB
MD578154cdfa4f3f55bed9d75a156074339
SHA1b9686803da5ce4655f8b8280107c5a88274bc977
SHA25667cc746c24ad9141cb4f4c3db4ab4b7daefb279fb614cde9fe27fe2f049d595a
SHA5129898512c0eb45f7a44c358cab353ff65eb9aea2eaae8db8b6eb0c3b81e76ee2d7e69472a8df6dda11211995582e415f23453ac86f6592cd312a06e85fe8660ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2Filesize
1KB
MD5b30216b2d5ababe5952ca2b85c061881
SHA103bf1e69f431e43885186f636c6e44be827cd764
SHA2566bc776d5191da994ebf83a86f9f6c693ef898bfe02a07a2507ccc28edf7e0162
SHA512eb5656782b6eae8a5344ed3a9df181e77dea25130a86d52000156c5d8980904a42d8c9079a60cbdd8d86cc7a6acc5d6d9059498a7a5eb90fcda6254d22c140e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_EBD7B8AF3A6D56C51CDE1B85E8C855A8Filesize
1KB
MD5a653da18e33a7c95e1b00169ac83f18b
SHA1a8fdcd775755be20e7f69512fad319e40abf8eba
SHA2569b736d37d9d38fbc955faae3a72873747fa3060792de3bd5902d9ad5e9c3daab
SHA512e8c32d936763e7a53571b32e771713d15990ccacdb39764cc202128e5ca1494beeca3a7d687e326613dc6eaa5058ef5c8ebda8249fd69b7655454713dd772912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2Filesize
727B
MD53dc4181e96e768b9f4bbf41d1afa1dc1
SHA19ee79c2f26bf520c4e8a3b36daff9ce8e6e3cca8
SHA256a72e1936399b803b5c282aa625b1dd2e3c924897ba728887035ebd30a4e9eae4
SHA5128c6c6ec2b6513697995aac13b9f946a7f5442cea77d0d3053ae9cf0d7dedd6942c8eceabfcd0380156403002bea026b3b18d4926fec92a146faf41f0144a7958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBFilesize
471B
MD5da5a9f149955d936a31dc5e456666aac
SHA1195238d41c1e13448f349f43bb295ef2d55cb47a
SHA25679ac574c7c45144bb35b59ff79c78dc59b66592715dea01b389e3620db663224
SHA51260d7d1f5405470ba1e6b80066af2e78240acbea8db58b5a03660874605178aebaa9ce342ca97f17798109e7411e82466db5af064e39eaddc05410f2abe672f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554EFilesize
1KB
MD581afaa383e62ab9fb5c109a8085af9ab
SHA12e97af515e58fbd5912764d866f0586c850e9517
SHA256a29b6d44e6ba93676969a41736a669b958c5bbdad39961105a5d3ce2a84d94b2
SHA51215c7a56406e19f8e259e838b67f6c3b8675aa266a8daadff28198a3cd9c0af65cd6ad9273eca126070ed1090f1e50d500fb32e8149a64a4fff5e5668157e787a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
1KB
MD52d9b3451bf865eebf9d53a173b4683c5
SHA1911426c1b05e1b4a9e3ce0d2da4485d4e8bd6692
SHA2565605e792857829ce294da76fc4f36d42e958759fe0e10d262aa7ecb86429b2f2
SHA512031b3e3ad77cb274376be3dd2f3033cceb698c1634211c8a8b2ce6918026bdf2fae3282dfc76f3820b74c8ee2487d6270ecda4697a4dba74adc276a4945deb78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BBFilesize
727B
MD5e48b6e4b5351b7f68acc6375f58b4832
SHA1b17b7199b60c22b91a3df390d7a1c7874c7892a9
SHA256fed4553c22581ce3e71b78d3d45bddc8137beb99d2ff71a5423da909d6848d8c
SHA5125f3af281f1ec2292f0a0a905ad24a07c793c8e8ac0be9a0c86e9c1588b7f9cd6028c70433d7c228d60c7c9dbe1a1d3dd0afd3bf3795b388b6d48444edb1444b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
508B
MD5cb08181e8763ad7acd9c952f7f3aa539
SHA17a4cfdef462c3770ac12b2f1dde825c3f7b9fec5
SHA2569899826bd4f9c57023a33c208fc25e0207593c9e2c6a352a5f58fb05c24ec104
SHA51217bdaa779b82fb8a7f853e888269b3278ec1d96db1614d5fbbe77b94e78d37fddd8078b37769881e5d820a9b566b1356a58051fe0ff7a71bb4965b38c182a582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2Filesize
536B
MD5d9a4b3d26c08b7ffb992c9236872d3ee
SHA15f36e77728d9e3a6252a1efd01bb9d31e04a5695
SHA256326918196dadef01b7f19054f77f8d8aba41a2ca40620e35e0b7a9af6f5afdc3
SHA5128fdc9e5b7777c3e5a35b33c51951701fed162bf663a2d115d6bb25ff7c6687a117276986a57913be43f8594783986184d623ef406e86d98aa6df5a7bf3992d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_EBD7B8AF3A6D56C51CDE1B85E8C855A8Filesize
540B
MD5d57ebc07616d5f596aad21eca382c524
SHA1c6db64d7b892f67159f2ce409cfe6be8f88b1a35
SHA2562bad97e9576db73ff95ac69d5216bca283022b5b8668934a7542f0a63540ed3a
SHA51278fbb940dd6c62b8547bbd6e71a166c2c81fc3f48e8e067055e304abc664bf1fb52e974feca934f49db95de5a0f2bbdf36d275d5c2f9038606002fe1cde55f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2Filesize
434B
MD557c05fa0adfd4c1934b7bdaa11f8cf99
SHA15ec4ae49a9f2778dbca000fc0296a50cbca8fda8
SHA256e92a0eb681f7d44843dbfb167d2d44166bf8a45f8012b838e09b4abacb562ce0
SHA512830ce444c9b02a5d6f1522f87640586a0acb008964d9db93e8b43d0bc706a9fd0e37fba4c6e22077b75ca4fe4d0bfb0a695a8f96763b5b682c34345d5d620f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBFilesize
430B
MD5f83b004054676e5791154e1723894e58
SHA19f625890cfe0b32a7bb8206214c3d8bb8725cc21
SHA2569f9c8d79f4f896e5257c52205cd6ac9690c7be3036f568463970fae522d4bbe8
SHA512d198f13782588538e979395b92f73b0149c92e1dc16238eea75c11231cc4db8bded5712b42423c18c3afd35f5ebed9955d2447a1fcf7301c3bb5b37e554650da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554EFilesize
536B
MD54a1f0fe4b9c556c06dc7ce0e04b54920
SHA1238e3b126ab99fea0193f809880d4d6bf1a8c009
SHA256e1de8c73e29b05763bb6ef577ad386e243da5334a2289ef5462d03bd29eda7d5
SHA5129dd7db74dc8e1fe07aa02395e839351bd85eb1ac0b2589e7b2429159eb23ad544f4376f74b8276c296193dddd4e34536d139f9a92f4a15a222d0e78c169213a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
506B
MD57eb8649827c67ba60fe7c1b07f840b5e
SHA1e64a51affb5445c5a8d6a4feb11305d9d9677568
SHA25631140b14c3fa995f5b51c5e39505c1a59eaef32307ebf1bc5e947d709ebbc34c
SHA5129d17955f7bae82219987e98c12e98e00cd18f24cc79006a4caebeb8cd14dcdb5aa5261f94ab5b5bb7e30023cc00f6e3efff1b7f5f3279c2d7aa213079636d7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BBFilesize
442B
MD5dc1e0fb9d0e7938caab3f8c223180611
SHA1824b25cf7ec54846495b5b4edfee6e9024a86041
SHA25666f1cd376479b286d42539e7d5d626f617d4be07755fc3a3d85fb0e21a8e7a80
SHA512720e2848223b1a4cb216267fefc2f39fe90c3a4c22bd7dde4cfba144a1be42313c5466e729fe443f9aa161096639a48a0b9da801ff232e96abd142824182d0b7
-
C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\BRAND_COMMONFilesize
23.3MB
MD5105d3263b0bca342b425fc45702c8856
SHA100180722d29af289bb7d2138a52b9d784ce367da
SHA2567547bc1f22cb361a4e644f899f8494faa013e15f05b75b77e1ea596532dc4fee
SHA512f6d3a7a25af1c10bbf5fb18b406f30c2c7d92778731f6b6d3eb6f181bc7854e920f99e1f55d2fdc0484bd1bd9bb13942ef13da85d1823c1f5cba16568cb45efb
-
C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\BROWSER.PACKED.7ZFilesize
90.8MB
MD55e99de825a34c299b8eef00c8d475e3d
SHA16fc1d9ef19f3d2aae0fb4ac596afbb24b408d83d
SHA2566f945efb7783b3ba9b8b48ffef9dc62322d11d51c401bbeaa1cf0aebf768b4ed
SHA512dd272ce4dd7f4529fb4b4a182cab7fa63bae0f455ea5bf843888c59d9fc13d1564b0f436b5afcd2c3d449979dcd82e0c71f45b6ae54e41e1ebbb649dd060e68a
-
C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\brand_yandexFilesize
2.1MB
MD5cff7f43a37e2081aa5271b2e42e20699
SHA19d50fec6b4b583e6b90cbc6906bb6838ded606d8
SHA25658ee5e657246dadd99f6194ffe082a27a8896aaa4500ff6773054a3929a912fd
SHA5124eb33ae0d9c9afb8116c9454b1ce06cefc6f59f21463ba9c04d45ed09b3fe61d1ef3aee1570e92d2657d4f6d33a603288f5ff5c04464bb6da75e16002763e2de
-
C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\YB_0DE85.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\clids.xmlFilesize
599B
MD5dae47d5fb36af27a9869750c11f52494
SHA1366629747a061c7bd6a6883f5364734cecfc697a
SHA25637ec2fcea5119863c67d94c2d269ec242e294cb76c9674e793d7280b6fd13c90
SHA5126937d3a2f3c4ecd3544a473a79808f1932e036cbafe6bff11d51f5d131fd8b6e594dbdfb254f96f49177cac5517e536bc14d855beaf3c81349ddbf7324bf79b4
-
C:\Users\Admin\AppData\Local\Temp\distrib_infoFilesize
293B
MD55ff4663cf4ed5b1c4c7e84ae7a26484b
SHA1738deb4f237c34acab7ecf6a2899c7bd94ecd34a
SHA256f69eb6cd9983e819f7c1273598046ace4ef35c97cc651b89b460bb05dbd58c81
SHA512f9f7a15bd4d811d0a0a986d24b18d76434f89f81f6554cf0f707a0298a26f0732389e85394d186dd22a6c0306b8568c94d5583891196328e0e3945f44af59bbc
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
10KB
MD5027e6aa3d4bfaed3b4e1a0cebc14c9c1
SHA17b2de8427bca60172cac1eb8ad6db58e4b60d2d0
SHA2566455f601b8aab4da0ff4f3a1b875c8a0bfb245ecd4080a234e98c86fce7776a0
SHA5120e046df3f7e95bc51450c3290cf6f80bd541d2be60340a19f79236fd1e042aaf55b20691aa5b8e7a173a34b041741be46a979fb6b88f02721a524f9dedd5ff95
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
10KB
MD53d49cf5e0faab98cbf599c81e9399643
SHA19d8d9f9babbd563a344fb58c20f866fa39f04317
SHA256a259715f2de5881121d690fffc2358eb4bd60d8e55a29ea1aec74c408ea26238
SHA5127c8894d8e9a3f936464090761ed02dab54b8f6cb33d94f9af714bbcdd5f7bda4d21d0b59c5e759088c9fabcc0fe6cc30faedfea0eff1c4762c59974bc81c37b3
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
16KB
MD5ebba5fafb7e5ef64c0932d56658b5b6e
SHA19279252fd9d7ffece498ccc5052d7a0c87c8893c
SHA2569787f099eb8eaf514dbe66cec460b174db4c3a297bdaf9b74522bec66439bf13
SHA512d883c2453f017d8911ddeb34aa88de367705b25008188c13944cf5f82c3174c1c5b849db62ede1225131aed93f628c7f7e530b67dd8e827a549dd0aa7bc9d054
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
16KB
MD51956b4372f454b259583d3c0fa6b851f
SHA1f64bfb052877becce8de3f8f685736d7fa1889fd
SHA2561bdb7737db37cad56dea1d550d0821c00c5f3b649bbf72572d6461b88fd4f33f
SHA512e365c26f37b898a486197f8273170f77ea6b82c5e496ee0407316d28c724789c6da9b74d26741e3610ffed0917ff07295a653b0b8a728b9544ea3383521ae99c
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
27KB
MD5cfa81744645da432cfa88cefae51249d
SHA1ceaac0da80c77bc7c1c8e7f80a9842d55c553b5f
SHA25659c79717451d7e5f762eee0602b3de99f3e556fd31cef35818c08391aab22809
SHA5121a07edaca442dd9da97f8481b0ef77ffba7745fb33a60c1bc38c05f97ab860dd07944a215722f3d410fdbfc2e6c4d57df20ab092c162fb2bb259ddf00e31bf18
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
28KB
MD5f32d21ca589b2da210b7eadf152b42ce
SHA1d2a3ec406d23c145738b694eafd0deda9e523578
SHA256c806d3df4232ed0a00faa7bce8fc28558fc64e9c49861cac6c38e36a45d8b045
SHA512dc7f39d5cc054922ddfc2987e714cd17a779928b6d08d71903290931dfdf4ecf8026cee5a92c8ee1e91f87c2a750c423a00191e7e9e1e157413183383f574be3
-
C:\Users\Admin\AppData\Local\Temp\master_preferencesFilesize
129KB
MD5ea23ca99cef3154fa52e403162fbfbb0
SHA17b6bf4ef68cf929fbe2a8a5bd06577c68e19b8ba
SHA256c23a22d152a3a2a12104c63477dc742d18b9624797048e46f76457a8eee7811b
SHA512b213e9280c3944c053ba8cbd0f9b211a1f3c3bd2e36c8b1a4363040b69ea1822dd90803067b383008f84456bf8f53000d710b744fce936f5fab15aa2cdae3170
-
C:\Users\Admin\AppData\Local\Temp\master_preferencesFilesize
129KB
MD5ea23ca99cef3154fa52e403162fbfbb0
SHA17b6bf4ef68cf929fbe2a8a5bd06577c68e19b8ba
SHA256c23a22d152a3a2a12104c63477dc742d18b9624797048e46f76457a8eee7811b
SHA512b213e9280c3944c053ba8cbd0f9b211a1f3c3bd2e36c8b1a4363040b69ea1822dd90803067b383008f84456bf8f53000d710b744fce936f5fab15aa2cdae3170
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1960_2024377228\explorer.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1960_2024377228\explorer.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\website.icoMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\yandex_browser_installer.logFilesize
5KB
MD5ea680fe2a626f4461b4ab4354a7b9c52
SHA146c5b7b9bb3fb0c0af530ff27ba2c8f57b5ce7cf
SHA256d8bd56e01cad03e65c1605a8b9e5a34c4bc08aef2c68e0144228996e9ad0d08c
SHA512171eeb0f9c7c557d67eb938e4fa9a0d147cb9dd33a075102c7ce55f2828cb82fa0227b7613a46c6cbaf5da0d9b382eb0e1e101daa59f7ce449d6b7dd71f2e1a8
-
C:\Users\Admin\AppData\Local\Temp\yandex_browser_installer.logFilesize
22KB
MD504136795242ec19526b86ba201f059ce
SHA179c0e0cb276f70d89f0c4b5225929aec64530214
SHA2563fe615433cb70a8626acc4b2e8df2f50c92a10fe6f13d3e1fc5876ad6da9c07b
SHA512c83c1edc6161393056734eb20eb1ace6918cf264c1718278d6e0d31cd2ef741794a2d2c0d2c1323bb980babe97eb52add807bbc83beb86d1514473d60f793223
-
C:\Users\Admin\AppData\Local\Temp\yb8041.tmpFilesize
149.8MB
MD5ff228e3e10f4d98d961e8a361861180d
SHA130fb83fafd7e79ed0ecd11a5231773d46a83e9f7
SHA256b64ea939b798557ffe48495520fb4a0e249a30d316cefc8c4ceca021b4b091ad
SHA5121763b1fc773aa4a3f6e34157751b7707467916ffee91d0ddf2096fe2bc5bffe677229de1ed35a47d35af4c25139d624189a8d5c418de8174126aef0f0bfc85e9
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeFilesize
591KB
MD510d2e0956493b129149705225fa3efb3
SHA1547ca5cb2eb4ad2dadb93e68869d1d8b26b395c1
SHA256a439fddafa27eacf7bfd86fd46c0683f9cd31c0a752b9abc522be77f295f1b1e
SHA512df4769611bf5d9a7458e641c97134ad2553bf01a834b2d08e1919153189860fce42cc712ea5182211f03d5c2c6d42967cd43129323adf21b146f21aaab04d253
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeFilesize
591KB
MD510d2e0956493b129149705225fa3efb3
SHA1547ca5cb2eb4ad2dadb93e68869d1d8b26b395c1
SHA256a439fddafa27eacf7bfd86fd46c0683f9cd31c0a752b9abc522be77f295f1b1e
SHA512df4769611bf5d9a7458e641c97134ad2553bf01a834b2d08e1919153189860fce42cc712ea5182211f03d5c2c6d42967cd43129323adf21b146f21aaab04d253
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeFilesize
3.8MB
MD52fadcc66fdf395c8fd19a424745a855c
SHA1b40174f66741be5f5afc814b3797dd5af7891b30
SHA256d43da70412b55377532192ab6658074bd73592ab1552a1bb53edf823ee655972
SHA5123ac2d369e2708309bac2796071bbd53c32fb462ea0373898c5701d3d776b4ce573eb28275148cebff2f2602cf8922f4dd7ddd9ecc533988a1a05e8578b6b6633
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad\settings.datFilesize
48B
MD5b9dde0c5529f9fd789eefe05c6111003
SHA1a6efd3ab7d3248b8954f2f582023cdca366c4607
SHA256a68e09b6ac51e2c1aafe2da7b13e5a4a2e029b419550e07fb18f064c42355bf5
SHA512f75a7ae56f9d2d6ff683d9bfdfcfb5b9a6582033c650d86bc23a896db1deb45da5934517ee03d3abc81da43366a9d4bb7ab52b9f3b826a68d26950793173c01f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yandex.lnkFilesize
2KB
MD5cc3a94edd195cddea0d01993b2e4419d
SHA16de25c97649736ecdba5b9da40d57e44d923f35a
SHA2562fe5b49035ad6921bf3c3c3a8c0f917c7e436ebbaeae3defcafbe3b3fa96533a
SHA512e4602f416a58992a306812319c1e0b59334ed57909d261c893bbaedd5e58ae71612eea5ddf021e7cb8a0d2c4a8502c1253cbc850d74b271c9ef08bdef983d00c
-
C:\Users\Admin\AppData\Roaming\Yandex\uiFilesize
38B
MD5bf2c0b185b4993d42f2fbce5304a1f92
SHA15ebaee67e7004539d2042412da0e4e0204416d36
SHA256c480c0ca8807abcaadbb93e94b9991d50fc5cd353e86ce3f9c0af4aa27137ac1
SHA512b0bec4579b927df6c61ba5f008282fdc42e4a7a8a7e2079148e0d3040876e8971c4db1aef78ece1d0f9822fe7db00ab92ff43ffc9d9c8a36f1eb9934fcfb8c18
-
C:\Windows\TEMP\sdwra_1960_100543684\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Windows\Temp\sdwra_1960_100543684\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
memory/208-3520-0x0000000000000000-mapping.dmp
-
memory/224-802-0x0000000000000000-mapping.dmp
-
memory/420-3191-0x0000000000000000-mapping.dmp
-
memory/592-752-0x0000000000000000-mapping.dmp
-
memory/660-2944-0x0000000000000000-mapping.dmp
-
memory/948-1204-0x0000000000000000-mapping.dmp
-
memory/980-3238-0x0000000000000000-mapping.dmp
-
memory/980-2173-0x0000000000000000-mapping.dmp
-
memory/1056-8439-0x0000022337120000-0x0000022337192000-memory.dmpFilesize
456KB
-
memory/1056-11609-0x00000223370B0000-0x00000223370FD000-memory.dmpFilesize
308KB
-
memory/1056-11592-0x0000022337220000-0x0000022337292000-memory.dmpFilesize
456KB
-
memory/1056-11591-0x00000223370B0000-0x00000223370FD000-memory.dmpFilesize
308KB
-
memory/1072-3341-0x0000000000000000-mapping.dmp
-
memory/1128-11582-0x0000019143850000-0x000001914389D000-memory.dmpFilesize
308KB
-
memory/1128-8438-0x0000019143980000-0x00000191439F2000-memory.dmpFilesize
456KB
-
memory/1128-11607-0x0000019143850000-0x000001914389D000-memory.dmpFilesize
308KB
-
memory/1128-11590-0x0000019143EA0000-0x0000019143F12000-memory.dmpFilesize
456KB
-
memory/1148-11597-0x000002D029770000-0x000002D0297BD000-memory.dmpFilesize
308KB
-
memory/1148-8442-0x000002D029D60000-0x000002D029DD2000-memory.dmpFilesize
456KB
-
memory/1148-11598-0x000002D029E50000-0x000002D029EC2000-memory.dmpFilesize
456KB
-
memory/1156-2849-0x0000000000000000-mapping.dmp
-
memory/1164-2484-0x0000000000000000-mapping.dmp
-
memory/1188-1822-0x0000000000000000-mapping.dmp
-
memory/1268-2900-0x0000000000000000-mapping.dmp
-
memory/1320-1689-0x0000000000000000-mapping.dmp
-
memory/1352-11593-0x0000024576E60000-0x0000024576EAD000-memory.dmpFilesize
308KB
-
memory/1352-11594-0x00000245775B0000-0x0000024577622000-memory.dmpFilesize
456KB
-
memory/1352-8440-0x0000024577000000-0x0000024577072000-memory.dmpFilesize
456KB
-
memory/1352-11610-0x0000024576E60000-0x0000024576EAD000-memory.dmpFilesize
308KB
-
memory/1392-11599-0x0000022003350000-0x000002200339D000-memory.dmpFilesize
308KB
-
memory/1392-11600-0x0000022003FC0000-0x0000022004032000-memory.dmpFilesize
456KB
-
memory/1392-8443-0x0000022003C00000-0x0000022003C72000-memory.dmpFilesize
456KB
-
memory/1400-3651-0x0000000000000000-mapping.dmp
-
memory/1408-463-0x0000000000000000-mapping.dmp
-
memory/1568-8431-0x000001EA1D870000-0x000001EA1D8E2000-memory.dmpFilesize
456KB
-
memory/1568-8430-0x000001EA1D680000-0x000001EA1D6CD000-memory.dmpFilesize
308KB
-
memory/1744-11309-0x0000000000660000-0x000000000070E000-memory.dmpFilesize
696KB
-
memory/1744-11310-0x0000000000600000-0x0000000000640000-memory.dmpFilesize
256KB
-
memory/1744-11327-0x0000000000400000-0x00000000005AA000-memory.dmpFilesize
1.7MB
-
memory/1744-11349-0x0000000000600000-0x0000000000640000-memory.dmpFilesize
256KB
-
memory/1744-11351-0x0000000000400000-0x00000000005AA000-memory.dmpFilesize
1.7MB
-
memory/1756-1709-0x0000000000000000-mapping.dmp
-
memory/1868-11595-0x000001EF4AE30000-0x000001EF4AE7D000-memory.dmpFilesize
308KB
-
memory/1868-11596-0x000001EF4B420000-0x000001EF4B492000-memory.dmpFilesize
456KB
-
memory/1868-8441-0x000001EF4B3A0000-0x000001EF4B412000-memory.dmpFilesize
456KB
-
memory/1892-1977-0x0000000000000000-mapping.dmp
-
memory/1900-2844-0x0000000000000000-mapping.dmp
-
memory/1920-813-0x0000000000000000-mapping.dmp
-
memory/1960-2295-0x0000000000000000-mapping.dmp
-
memory/1960-398-0x0000000000000000-mapping.dmp
-
memory/2096-1137-0x0000000000000000-mapping.dmp
-
memory/2252-8435-0x0000020271B80000-0x0000020271BF2000-memory.dmpFilesize
456KB
-
memory/2252-11579-0x0000020272240000-0x00000202722B2000-memory.dmpFilesize
456KB
-
memory/2252-11578-0x0000020271B10000-0x0000020271B5D000-memory.dmpFilesize
308KB
-
memory/2252-11605-0x0000020271B10000-0x0000020271B5D000-memory.dmpFilesize
308KB
-
memory/2308-8750-0x0000025ACF100000-0x0000025ACF204000-memory.dmpFilesize
1.0MB
-
memory/2308-8747-0x0000025ACC9B0000-0x0000025ACC9D0000-memory.dmpFilesize
128KB
-
memory/2308-8746-0x0000025ACF100000-0x0000025ACF204000-memory.dmpFilesize
1.0MB
-
memory/2308-8742-0x0000025ACC990000-0x0000025ACC9AB000-memory.dmpFilesize
108KB
-
memory/2308-8731-0x0000025ACCB00000-0x0000025ACCB72000-memory.dmpFilesize
456KB
-
memory/2308-8748-0x0000025ACC9D0000-0x0000025ACC9EB000-memory.dmpFilesize
108KB
-
memory/2308-8749-0x0000025ACC990000-0x0000025ACC9AB000-memory.dmpFilesize
108KB
-
memory/2308-8432-0x0000025ACCB00000-0x0000025ACCB72000-memory.dmpFilesize
456KB
-
memory/2320-8437-0x0000025177110000-0x0000025177182000-memory.dmpFilesize
456KB
-
memory/2320-11581-0x00000251770A0000-0x00000251770ED000-memory.dmpFilesize
308KB
-
memory/2320-11589-0x0000025177200000-0x0000025177272000-memory.dmpFilesize
456KB
-
memory/2320-11606-0x00000251770A0000-0x00000251770ED000-memory.dmpFilesize
308KB
-
memory/2416-8445-0x000001B0AE440000-0x000001B0AE4B2000-memory.dmpFilesize
456KB
-
memory/2416-11602-0x000001B0AE930000-0x000001B0AE9A2000-memory.dmpFilesize
456KB
-
memory/2416-11601-0x000001B0ADAD0000-0x000001B0ADB1D000-memory.dmpFilesize
308KB
-
memory/2428-8446-0x0000024B78A10000-0x0000024B78A82000-memory.dmpFilesize
456KB
-
memory/2428-11603-0x0000024B78390000-0x0000024B783DD000-memory.dmpFilesize
308KB
-
memory/2428-11604-0x0000024B78B00000-0x0000024B78B72000-memory.dmpFilesize
456KB
-
memory/2436-2999-0x0000000000000000-mapping.dmp
-
memory/2476-153-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-173-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-116-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-149-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-148-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-151-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-147-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-117-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-118-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-120-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-121-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-179-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-123-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-124-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-125-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-146-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-152-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-178-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-175-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-126-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-127-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-145-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-128-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-144-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-129-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-154-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-143-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-177-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-130-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-176-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-174-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-155-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-142-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-150-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-172-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-171-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-141-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-170-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-140-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-169-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-156-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-168-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-167-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-166-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-165-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-139-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-138-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-164-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-137-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-163-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-131-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-136-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-162-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-115-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-132-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-161-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-160-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-133-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-157-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-158-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-134-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-159-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2476-135-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/2560-713-0x0000000000000000-mapping.dmp
-
memory/2640-1372-0x0000000000000000-mapping.dmp
-
memory/2648-3105-0x0000000000000000-mapping.dmp
-
memory/2708-8434-0x000002917D580000-0x000002917D5F2000-memory.dmpFilesize
456KB
-
memory/2708-11576-0x000002917DC50000-0x000002917DCC2000-memory.dmpFilesize
456KB
-
memory/2708-11574-0x000002917D4C0000-0x000002917D50D000-memory.dmpFilesize
308KB
-
memory/2708-11608-0x000002917D4C0000-0x000002917D50D000-memory.dmpFilesize
308KB
-
memory/2812-2869-0x0000000000000000-mapping.dmp
-
memory/2892-931-0x0000000000000000-mapping.dmp
-
memory/3104-3031-0x0000000000000000-mapping.dmp
-
memory/3256-1272-0x0000000000000000-mapping.dmp
-
memory/3460-1746-0x0000000000000000-mapping.dmp
-
memory/3620-569-0x0000000000000000-mapping.dmp
-
memory/3720-2696-0x0000000000000000-mapping.dmp
-
memory/3732-3288-0x0000000000000000-mapping.dmp
-
memory/3736-8151-0x0000000000F90000-0x0000000000FBE000-memory.dmpFilesize
184KB
-
memory/3796-1770-0x0000000000000000-mapping.dmp
-
memory/3908-180-0x0000000000000000-mapping.dmp
-
memory/3908-181-0x00000000777D0000-0x000000007795E000-memory.dmpFilesize
1.6MB
-
memory/3908-2883-0x0000000000000000-mapping.dmp
-
memory/3992-323-0x0000000000000000-mapping.dmp
-
memory/3996-3456-0x0000000000000000-mapping.dmp
-
memory/4016-1239-0x0000000000000000-mapping.dmp
-
memory/4040-8413-0x0000000000B10000-0x0000000000B6E000-memory.dmpFilesize
376KB
-
memory/4044-1490-0x0000000000000000-mapping.dmp
-
memory/4132-253-0x0000000000000000-mapping.dmp
-
memory/4168-2633-0x0000000000000000-mapping.dmp
-
memory/4244-1066-0x0000000000000000-mapping.dmp
-
memory/4244-2970-0x0000000000000000-mapping.dmp
-
memory/4248-632-0x0000000000000000-mapping.dmp
-
memory/4264-3147-0x0000000000000000-mapping.dmp
-
memory/4312-2858-0x0000000000000000-mapping.dmp
-
memory/4544-3398-0x0000000000000000-mapping.dmp
-
memory/4648-1493-0x0000000000000000-mapping.dmp
-
memory/4656-3584-0x0000000000000000-mapping.dmp
-
memory/4656-11250-0x0000000000F40000-0x00000000018C0000-memory.dmpFilesize
9.5MB
-
memory/4684-1794-0x0000000000000000-mapping.dmp
-
memory/4732-1305-0x0000000000000000-mapping.dmp
-
memory/4844-1612-0x0000000000000000-mapping.dmp
-
memory/4884-2564-0x0000000000000000-mapping.dmp
-
memory/4904-300-0x0000000000000000-mapping.dmp
-
memory/4932-8131-0x0000000002A60000-0x0000000002BFC000-memory.dmpFilesize
1.6MB
-
memory/4932-8626-0x0000000002A60000-0x0000000002BFC000-memory.dmpFilesize
1.6MB
-
memory/4956-2920-0x0000000000000000-mapping.dmp
-
memory/4960-901-0x0000000000000000-mapping.dmp
-
memory/4996-2631-0x0000000000000000-mapping.dmp
-
memory/5028-2181-0x0000000000000000-mapping.dmp
-
memory/5052-3066-0x0000000000000000-mapping.dmp
-
memory/5068-1626-0x0000000000000000-mapping.dmp
-
memory/5076-1727-0x0000000000000000-mapping.dmp
-
memory/5652-11495-0x0000000000BD0000-0x0000000001550000-memory.dmpFilesize
9.5MB
-
memory/5820-11170-0x00000000010F0000-0x0000000001CC2000-memory.dmpFilesize
11.8MB
-
memory/5820-11113-0x00000000603A0000-0x0000000060950000-memory.dmpFilesize
5.7MB
-
memory/5820-11101-0x00000000010F0000-0x0000000001CC2000-memory.dmpFilesize
11.8MB
-
memory/5820-11174-0x00000000603A0000-0x0000000060950000-memory.dmpFilesize
5.7MB