Resubmissions
17-10-2022 19:36
221017-ybkpeacgf7 1017-10-2022 17:27
221017-v1ye1scfdl 817-10-2022 14:10
221017-rg6qhacbgq 8Analysis
-
max time kernel
1800s -
max time network
1798s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2022 19:36
Static task
static1
Behavioral task
behavioral1
Sample
Yandex.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Yandex.exe
Resource
win10-20220812-en
General
-
Target
Yandex.exe
-
Size
2.4MB
-
MD5
09bb3df23630c9111a5860cb96bde6ad
-
SHA1
217d78e392e7ef295596862175eb353977a85738
-
SHA256
e36891d982acaa5b12e27cf55fae3581e29dd0ef35d0dd98ae93296034b5177e
-
SHA512
8a216eac67b5d4bc54781a166cd48ab8a68e0b983fb346c14030eca060046fe7484f76fa4eb006164c5781684cad82f7d29afaf9514e70c81feffe70df402f31
-
SSDEEP
49152:CsEpJsMKSCZrcPEGuW9Q+iA5H5u8QeuL:CsEpuBZrcPEGuWMxt
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
ybEF85.tmpsetup.exesetup.exesetup.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeexplorer.exeexplorer.exeYandex.exeexplorer.exebrowser.execlidmgr.execlidmgr.execlidmgr.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser_diagnostics.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 3984 ybEF85.tmp 3768 setup.exe 2848 setup.exe 716 setup.exe 1200 service_update.exe 864 service_update.exe 4656 service_update.exe 2436 service_update.exe 4436 service_update.exe 4936 service_update.exe 3228 service_update.exe 1244 explorer.exe 5024 explorer.exe 3268 Yandex.exe 2168 explorer.exe 1520 browser.exe 1880 clidmgr.exe 876 clidmgr.exe 744 clidmgr.exe 884 browser.exe 3092 browser.exe 2832 browser.exe 3248 browser.exe 3228 browser.exe 4588 browser.exe 3532 browser.exe 3576 browser.exe 320 browser.exe 1520 browser.exe 544 browser.exe 4332 browser.exe 2392 browser.exe 520 browser.exe 4552 browser.exe 1820 browser_diagnostics.exe 2240 browser.exe 2296 browser.exe 5164 browser.exe 5396 browser.exe 5488 browser.exe 5504 browser.exe 5528 browser.exe 5592 browser.exe 5664 browser.exe 5744 browser.exe 5784 browser.exe 5868 browser.exe 5904 browser.exe 5960 browser.exe 6040 browser.exe 6100 browser.exe 6128 browser.exe 3220 browser.exe 5244 browser.exe 5252 browser.exe 3216 browser.exe 1996 browser.exe 5508 browser.exe 5760 browser.exe 2304 browser.exe 5044 browser.exe 4740 browser.exe 5248 browser.exe 5180 browser.exe -
Checks computer location settings 2 TTPs 54 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Yandex.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exesetup.exebrowser.exebrowser.exebrowser.exebrowser.exeexplorer.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exeYandex.exeservice_update.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exeexplorer.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Yandex.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Yandex.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation service_update.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation browser.exe -
Loads dropped DLL 64 IoCs
Processes:
browser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 884 browser.exe 3092 browser.exe 884 browser.exe 884 browser.exe 2832 browser.exe 3248 browser.exe 3248 browser.exe 2832 browser.exe 2832 browser.exe 2832 browser.exe 2832 browser.exe 2832 browser.exe 2832 browser.exe 3228 browser.exe 3228 browser.exe 4588 browser.exe 3532 browser.exe 4588 browser.exe 3532 browser.exe 3576 browser.exe 3576 browser.exe 320 browser.exe 320 browser.exe 1520 browser.exe 1520 browser.exe 544 browser.exe 544 browser.exe 4332 browser.exe 4332 browser.exe 4332 browser.exe 2392 browser.exe 2392 browser.exe 520 browser.exe 520 browser.exe 4552 browser.exe 4552 browser.exe 2240 browser.exe 2240 browser.exe 2296 browser.exe 2296 browser.exe 5164 browser.exe 5164 browser.exe 5396 browser.exe 5396 browser.exe 5488 browser.exe 5488 browser.exe 5504 browser.exe 5504 browser.exe 5528 browser.exe 5528 browser.exe 5592 browser.exe 5592 browser.exe 5664 browser.exe 5664 browser.exe 5744 browser.exe 5744 browser.exe 5784 browser.exe 5784 browser.exe 5868 browser.exe 5868 browser.exe 5904 browser.exe 5904 browser.exe 5960 browser.exe 5960 browser.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
browser.exebrowser.exebrowser.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YandexBrowserAutoLaunch_45886AE68CD319C7351FF54A1DBD4B87 = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --shutdown-if-not-closed-by-system-restart" browser.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YandexBrowserAutoLaunch_45886AE68CD319C7351FF54A1DBD4B87 = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --shutdown-if-not-closed-by-system-restart" browser.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YandexBrowserAutoLaunch_45886AE68CD319C7351FF54A1DBD4B87 = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --shutdown-if-not-closed-by-system-restart" browser.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
browser.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA browser.exe -
Drops file in System32 directory 18 IoCs
Processes:
service_update.exebct.exeservice_update.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2 service_update.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini bct.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B service_update.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\_[1].js service_update.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Yandex\ui service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 service_update.exe File opened for modification C:\Windows\System32\GroupPolicy bct.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2 service_update.exe -
Drops file in Program Files directory 3 IoCs
Processes:
service_update.exeservice_update.exedescription ioc process File opened for modification C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\debug.log service_update.exe File created C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe service_update.exe File opened for modification C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe service_update.exe -
Drops file in Windows directory 6 IoCs
Processes:
browser.exeservice_update.exeservice_update.exebrowser.exebrowser.exedescription ioc process File opened for modification C:\Windows\Tasks\Обновление Браузера Яндекс.job browser.exe File created C:\Windows\Tasks\System update for Yandex Browser.job service_update.exe File created C:\Windows\Tasks\Update for Yandex Browser.job service_update.exe File created C:\Windows\Tasks\Repairing Yandex Browser update service.job service_update.exe File created C:\Windows\Tasks\Обновление Браузера Яндекс.job browser.exe File opened for modification C:\Windows\Tasks\Обновление Браузера Яндекс.job browser.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 15 IoCs
Processes:
browser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe -
Modifies data under HKEY_USERS 17 IoCs
Processes:
service_update.exebrowser.exebrowser.exeservice_update.exebrowser.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" service_update.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry browser.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" service_update.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry browser.exe Key created \REGISTRY\USER\.DEFAULT\Software service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" service_update.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry browser.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Yandex\UICreated_SYSTEM = "1" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing service_update.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133105162900925974" browser.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Yandex service_update.exe -
Modifies registry class 64 IoCs
Processes:
setup.exebrowser.exeYandex.exeexplorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexEPUB.W2HYC7HFLXG5B55F7VVALJBUNM\shell\open\command setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexFB2.W2HYC7HFLXG5B55F7VVALJBUNM\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexPNG.W2HYC7HFLXG5B55F7VVALJBUNM\ = "Yandex Browser PNG Document" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexWEBP.W2HYC7HFLXG5B55F7VVALJBUNM\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexHTML.W2HYC7HFLXG5B55F7VVALJBUNM\Application\AppUserModelId = "Yandex.W2HYC7HFLXG5B55F7VVALJBUNM" setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\.webp\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SystemFileAssociations\.png\shell\image_search\command browser.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexCSS.W2HYC7HFLXG5B55F7VVALJBUNM\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SystemFileAssociations\.gif\shell\image_search\command browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexINFE.W2HYC7HFLXG5B55F7VVALJBUNM\ = "Malware Infected File" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexJPEG.W2HYC7HFLXG5B55F7VVALJBUNM\ = "Yandex Browser JPEG Document" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\yabrowser\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SystemFileAssociations\.gif\shell\image_search browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SystemFileAssociations\.gif\shell\image_search\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --image-search=\"%1\"" browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexBrowser.crx\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexGIF.W2HYC7HFLXG5B55F7VVALJBUNM\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\.txt setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\.txt\OpenWithProgids\YandexTXT.W2HYC7HFLXG5B55F7VVALJBUNM setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Yandex.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SystemFileAssociations\.gif browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexCSS.W2HYC7HFLXG5B55F7VVALJBUNM\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-124" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexHTML.W2HYC7HFLXG5B55F7VVALJBUNM\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexHTML.W2HYC7HFLXG5B55F7VVALJBUNM\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-108" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexJS.W2HYC7HFLXG5B55F7VVALJBUNM\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-126" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexJPEG.W2HYC7HFLXG5B55F7VVALJBUNM\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\.tiff\OpenWithProgids\YandexTIFF.W2HYC7HFLXG5B55F7VVALJBUNM setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SystemFileAssociations\.bmp\shell\image_search browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\.crx\ = "YandexBrowser.crx" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\.png\OpenWithProgids\YandexPNG.W2HYC7HFLXG5B55F7VVALJBUNM setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\.fb2 setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexWEBP.W2HYC7HFLXG5B55F7VVALJBUNM\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\.infected setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexWEBM.W2HYC7HFLXG5B55F7VVALJBUNM\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexFB2.W2HYC7HFLXG5B55F7VVALJBUNM setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexFB2.W2HYC7HFLXG5B55F7VVALJBUNM\shell\open setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexJS.W2HYC7HFLXG5B55F7VVALJBUNM\ = "Yandex Browser JS Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexJPEG.W2HYC7HFLXG5B55F7VVALJBUNM\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexTIFF.W2HYC7HFLXG5B55F7VVALJBUNM setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexTIFF.W2HYC7HFLXG5B55F7VVALJBUNM\DefaultIcon setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\yabrowser\shell\ = "open" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexGIF.W2HYC7HFLXG5B55F7VVALJBUNM\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexJPEG.W2HYC7HFLXG5B55F7VVALJBUNM setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexHTML.W2HYC7HFLXG5B55F7VVALJBUNM\Application setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SystemFileAssociations\.tif\shell browser.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SystemFileAssociations\.bmp\shell browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexEPUB.W2HYC7HFLXG5B55F7VVALJBUNM\ = "Yandex Browser EPUB Document" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SystemFileAssociations\.jpg\shell\image_search\Icon = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,0" browser.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\.webm setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\.htm setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SystemFileAssociations\.gif\shell\image_search\ = "Поиск по картинке" browser.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexWEBP.W2HYC7HFLXG5B55F7VVALJBUNM setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\.xht setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexTXT.W2HYC7HFLXG5B55F7VVALJBUNM\shell\open setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexEPUB.W2HYC7HFLXG5B55F7VVALJBUNM\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexJS.W2HYC7HFLXG5B55F7VVALJBUNM\DefaultIcon setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\.shtml setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexBrowser.crx\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexJS.W2HYC7HFLXG5B55F7VVALJBUNM\shell setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexTIFF.W2HYC7HFLXG5B55F7VVALJBUNM\ = "Yandex Browser TIFF Document" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\YandexHTML.W2HYC7HFLXG5B55F7VVALJBUNM\Application\ApplicationCompany = "ООО\u00a0«ЯНДЕКС»" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\.css\OpenWithProgids\YandexCSS.W2HYC7HFLXG5B55F7VVALJBUNM setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\yabrowser\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,0" setup.exe -
Processes:
browser.exebrowser.exeYandex.exesetup.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\CA7788C32DA1E4B7863A4FB57D00B55DDACBC7F9 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d090000000100000042000000304006082b06010505070302060a2b0601040182370a030c060a2b0601040182370a030406082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000000687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd67707390b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b660537f000000010000000e000000300c060a2b0601040182370a03047e000000010000000800000000c001b39667d601030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 0f0000000100000030000000c130bba37b8b350e89fd5ed76b4f78777feee220d3b9e729042bef6af46e8e4c1b252e32b3080c681bc9a8a1afdd0a3c0b000000010000004200000047006c006f00620061006c005300690067006e00200043006f006400650020005300690067006e0069006e006700200052006f006f007400200052003400350000006200000001000000200000007b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df8653000000010000001f000000301d301b060567810c010330123010060a2b0601040182373c0101030200c01400000001000000140000001f00bf46800afc7839b7a5b443d95650bbce963b1d00000001000000100000005467b0adde8d858e30ee517b1a19ecd909000000010000000c000000300a06082b060105050703030300000001000000140000004efc31460c619ecae59c1bce2c008036d94c84b8200000000100000076050000308205723082035aa00302010202107653feac75464893f5e5d74a483a4ef8300d06092a864886f70d01010c05003053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f7420523435301e170d3230303331383030303030305a170d3435303331383030303030305a3053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f742052343530820222300d06092a864886f70d01010105000382020f003082020a0282020100b62dc530dd7ae8ab903d0372b03a4b991661b2e5ffa5671d371ce57eec9383aa84f5a3439b98458ab863575d9b00880425e9f868924b82d84bc94a03f3a87f6a8f8a6127bda144d0fdf53f22c2a34f918db305b22882915dfb5988050b9706c298f82ca73324ee503a41ccf0a0b07b1d4dd2a8583896e9dff91b91bb8b102cd2c7431da20974a180af7be6330a0c596b8ebcf4ab5a977b7fae55fb84f080fe844cd7e2babdc475a16fbd61107444b29807e274abff68dc6c263ee91fe5e00487ad30d30c8d037c55b816705c24782025eb676788abba4e34986b7011de38cad4bea1c09ce1df1e0201d83be1674384b6cffc74b72f84a3bfba09373d676cb1455c1961ab4183f5ac1deb770d464773cebfbd9595ed9d2b8810fefa58e8a757e1b3cfa85ae907259b12c49e80723d93dc8c94df3b44e62680fcd2c303f08c0cd245d62ee78f989ee604ee426e677e42167162e704f960c664a1b69c81214e2bc66d689486c699747367317a91f2d48c796e7ca6bb7e466f4dc585122bcf9a224408a88537ce07615706171224c0c43173a1983557477e103a45d92da4519098a9a00737c4651aaa1c6b1677f7a797ec3f1930996f31fbea40b2e7d2c4fac9d0f050767459fa8d6d1732bef8e97e03f4e787759ad44a912c850313022b4280f2896a36cfc84ca0ce9ef8cb8dad16a7d3ded59b18a7c6923af18263f12e0e2464df0203010001a3423040300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e041604141f00bf46800afc7839b7a5b443d95650bbce963b300d06092a864886f70d01010c050003820201005e2bba749734445f764828408493ee016ee9a1b3d68025e67be4bc09913d0ffc76add7d43020bb8f60d091d61cf29cef781a2b943202c12496525202d0f3d1fcf29b396e99e11f8e43417d9a1e5bc95d9a84fc26e687f3747226ada41bd93d3b6a52a03c091e2f1e7bb333b445c7f7acb1af9360ad76aeb8b21578eb836aebffdb46ab24e5ee02fa901f59c02f5dd6b75da45c10b77253f8414eccfa781a254acafe85624361c3b437aa81d2f4d63a0fbd8d597e3047de2b6be72150335fd4679bd4b8679f3c279903ff85438e7312ca20cde861d5b166dc17d6396d0fdbcf2337a182894e1c6b3fd6a0cdaa079d3e4226aad70ceefa47bf1a527ed17581d3c98a62176d4f88a021a0263eaf6dd962301fe99828ae6e8dd58e4c726693808d2ae355c760679042565c22510fb3dc4e39ee4dddd91d7810543b6ed0976f03b51eb22373c612b29a64d0fc958524a8ffdfa1b0dc9140aedf0933abb9dd92b7f1cc91743b69eb67971b90bfe7c7a06f71bb57bfb78f5aed7a406a16cd80842d2fe102d4249443b315fc0c2b1bfd716ffccbbc75173a5e83d2c9b32f1bd59c8d7f54fe7e7ee456a387a79de1595294418f6d5bbe86959aff1a76dd40d2514a70b41f336323773fec271e59e40887ed34824a0f3ffea01dc1f56773458678f4aa29e92787c619dbc61314c33949874da097e06513f59d7756e9dab358c73af2c0cd82 Yandex.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 browser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 browser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 browser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 Yandex.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 190000000100000010000000d0fd3c9c380d7b65e26b9a3fedd39b8f030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad1d000000010000001000000001728e1ecf7a9d86fb3cec8948aba9531400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc620000000100000020000000cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b0b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520033000000530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef453000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 browser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\CA7788C32DA1E4B7863A4FB57D00B55DDACBC7F9\Blob = 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 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 browser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 browser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD browser.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 Yandex.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
setup.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeexplorer.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 2848 setup.exe 2848 setup.exe 1200 service_update.exe 1200 service_update.exe 864 service_update.exe 864 service_update.exe 4656 service_update.exe 4656 service_update.exe 4656 service_update.exe 4656 service_update.exe 4436 service_update.exe 4436 service_update.exe 4936 service_update.exe 4936 service_update.exe 3228 service_update.exe 3228 service_update.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 2848 setup.exe 2848 setup.exe 2848 setup.exe 2848 setup.exe 884 browser.exe 884 browser.exe 3248 browser.exe 3248 browser.exe 2832 browser.exe 3228 browser.exe 4588 browser.exe 3532 browser.exe 3532 browser.exe 3576 browser.exe 320 browser.exe 1520 browser.exe 884 browser.exe 884 browser.exe 544 browser.exe 4332 browser.exe 4332 browser.exe 2392 browser.exe 520 browser.exe 4552 browser.exe 2240 browser.exe 2296 browser.exe 5164 browser.exe 5396 browser.exe 5396 browser.exe 5488 browser.exe 5504 browser.exe 5528 browser.exe 5592 browser.exe 5664 browser.exe 5744 browser.exe 5784 browser.exe 5868 browser.exe 5904 browser.exe 5960 browser.exe 6040 browser.exe 6100 browser.exe 6128 browser.exe 3220 browser.exe 5244 browser.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
browser.exebrowser_diagnostics.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeDebugPrivilege 1820 browser_diagnostics.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: 33 4616 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4616 AUDIODG.EXE Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe Token: SeCreatePagefilePrivilege 884 browser.exe Token: SeShutdownPrivilege 884 browser.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Yandex.exeexplorer.exeexplorer.exebrowser.exepid process 2200 Yandex.exe 1244 explorer.exe 2168 explorer.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
browser.exepid process 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe 884 browser.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
Yandex.exebrowser.exebrowser.exebrowser.exepid process 2200 Yandex.exe 884 browser.exe 4684 browser.exe 3836 browser.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Yandex.exeYandex.exeybEF85.tmpsetup.exesetup.exeservice_update.exeservice_update.exeservice_update.exeexplorer.exeYandex.exebrowser.exedescription pid process target process PID 2200 wrote to memory of 1792 2200 Yandex.exe Yandex.exe PID 2200 wrote to memory of 1792 2200 Yandex.exe Yandex.exe PID 2200 wrote to memory of 1792 2200 Yandex.exe Yandex.exe PID 1792 wrote to memory of 3984 1792 Yandex.exe ybEF85.tmp PID 1792 wrote to memory of 3984 1792 Yandex.exe ybEF85.tmp PID 1792 wrote to memory of 3984 1792 Yandex.exe ybEF85.tmp PID 3984 wrote to memory of 3768 3984 ybEF85.tmp setup.exe PID 3984 wrote to memory of 3768 3984 ybEF85.tmp setup.exe PID 3984 wrote to memory of 3768 3984 ybEF85.tmp setup.exe PID 3768 wrote to memory of 2848 3768 setup.exe setup.exe PID 3768 wrote to memory of 2848 3768 setup.exe setup.exe PID 3768 wrote to memory of 2848 3768 setup.exe setup.exe PID 2848 wrote to memory of 716 2848 setup.exe setup.exe PID 2848 wrote to memory of 716 2848 setup.exe setup.exe PID 2848 wrote to memory of 716 2848 setup.exe setup.exe PID 2848 wrote to memory of 1200 2848 setup.exe service_update.exe PID 2848 wrote to memory of 1200 2848 setup.exe service_update.exe PID 2848 wrote to memory of 1200 2848 setup.exe service_update.exe PID 1200 wrote to memory of 864 1200 service_update.exe service_update.exe PID 1200 wrote to memory of 864 1200 service_update.exe service_update.exe PID 1200 wrote to memory of 864 1200 service_update.exe service_update.exe PID 4656 wrote to memory of 2436 4656 service_update.exe service_update.exe PID 4656 wrote to memory of 2436 4656 service_update.exe service_update.exe PID 4656 wrote to memory of 2436 4656 service_update.exe service_update.exe PID 4656 wrote to memory of 4436 4656 service_update.exe service_update.exe PID 4656 wrote to memory of 4436 4656 service_update.exe service_update.exe PID 4656 wrote to memory of 4436 4656 service_update.exe service_update.exe PID 4436 wrote to memory of 4936 4436 service_update.exe service_update.exe PID 4436 wrote to memory of 4936 4436 service_update.exe service_update.exe PID 4436 wrote to memory of 4936 4436 service_update.exe service_update.exe PID 4656 wrote to memory of 3228 4656 service_update.exe service_update.exe PID 4656 wrote to memory of 3228 4656 service_update.exe service_update.exe PID 4656 wrote to memory of 3228 4656 service_update.exe service_update.exe PID 2848 wrote to memory of 1244 2848 setup.exe explorer.exe PID 2848 wrote to memory of 1244 2848 setup.exe explorer.exe PID 2848 wrote to memory of 1244 2848 setup.exe explorer.exe PID 1244 wrote to memory of 5024 1244 explorer.exe explorer.exe PID 1244 wrote to memory of 5024 1244 explorer.exe explorer.exe PID 1244 wrote to memory of 5024 1244 explorer.exe explorer.exe PID 2848 wrote to memory of 3268 2848 setup.exe Yandex.exe PID 2848 wrote to memory of 3268 2848 setup.exe Yandex.exe PID 2848 wrote to memory of 3268 2848 setup.exe Yandex.exe PID 3268 wrote to memory of 2168 3268 Yandex.exe explorer.exe PID 3268 wrote to memory of 2168 3268 Yandex.exe explorer.exe PID 3268 wrote to memory of 2168 3268 Yandex.exe explorer.exe PID 2848 wrote to memory of 1520 2848 setup.exe browser.exe PID 2848 wrote to memory of 1520 2848 setup.exe browser.exe PID 2848 wrote to memory of 1520 2848 setup.exe browser.exe PID 2848 wrote to memory of 1880 2848 setup.exe clidmgr.exe PID 2848 wrote to memory of 1880 2848 setup.exe clidmgr.exe PID 2848 wrote to memory of 1880 2848 setup.exe clidmgr.exe PID 2848 wrote to memory of 876 2848 setup.exe clidmgr.exe PID 2848 wrote to memory of 876 2848 setup.exe clidmgr.exe PID 2848 wrote to memory of 876 2848 setup.exe clidmgr.exe PID 2848 wrote to memory of 744 2848 setup.exe clidmgr.exe PID 2848 wrote to memory of 744 2848 setup.exe clidmgr.exe PID 2848 wrote to memory of 744 2848 setup.exe clidmgr.exe PID 884 wrote to memory of 3092 884 browser.exe browser.exe PID 884 wrote to memory of 3092 884 browser.exe browser.exe PID 884 wrote to memory of 3092 884 browser.exe browser.exe PID 884 wrote to memory of 2832 884 browser.exe browser.exe PID 884 wrote to memory of 2832 884 browser.exe browser.exe PID 884 wrote to memory of 2832 884 browser.exe browser.exe PID 884 wrote to memory of 2832 884 browser.exe browser.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Yandex.exe"C:\Users\Admin\AppData\Local\Temp\Yandex.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Yandex.exe"C:\Users\Admin\AppData\Local\Temp\Yandex.exe" --parent-installer-process-id=2200 --run-as-admin --setup-cmd-line="fake_browser_arc --abt-config-resource-file=\"C:\Users\Admin\AppData\Local\Temp\abt_config_resource\" --abt-update-path=\"C:\Users\Admin\AppData\Local\Temp\5d9601d2-ded9-42a8-8c23-bc63f8667efc.tmp\" --brand-name=yandex --distr-info-file=\"C:\Users\Admin\AppData\Local\Temp\distrib_info\" --ok-button-pressed-time=454578598 --progress-window=458818 --send-statistics --the-interface-availability=190411288 --variations-update-path=\"C:\Users\Admin\AppData\Local\Temp\d96fe6a0-768d-4733-a533-2cf7ec028a8b.tmp\" --verbose-logging"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ybEF85.tmp"C:\Users\Admin\AppData\Local\Temp\ybEF85.tmp" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\5d9601d2-ded9-42a8-8c23-bc63f8667efc.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=17 --install-start-time-no-uac=456281559 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --ok-button-pressed-time=454578598 --progress-window=458818 --send-statistics --source=lite --the-interface-availability=190411288 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\d96fe6a0-768d-4733-a533-2cf7ec028a8b.tmp" --verbose-logging3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\BROWSER.PACKED.7Z" --searchband-file="C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\SEARCHBAND.EXE" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\5d9601d2-ded9-42a8-8c23-bc63f8667efc.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=17 --install-start-time-no-uac=456281559 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --ok-button-pressed-time=454578598 --progress-window=458818 --send-statistics --source=lite --the-interface-availability=190411288 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\d96fe6a0-768d-4733-a533-2cf7ec028a8b.tmp" --verbose-logging4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\BROWSER.PACKED.7Z" --searchband-file="C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\SEARCHBAND.EXE" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\5d9601d2-ded9-42a8-8c23-bc63f8667efc.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=17 --install-start-time-no-uac=456281559 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --ok-button-pressed-time=454578598 --progress-window=458818 --send-statistics --source=lite --the-interface-availability=190411288 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\d96fe6a0-768d-4733-a533-2cf7ec028a8b.tmp" --verbose-logging --verbose-logging --run-as-admin --target-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application" --child-setup-process --restart-as-admin-time=4600390505⤵
- Executes dropped EXE
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=2848 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x334,0x338,0x33c,0x310,0x340,0x11d21d8,0x11d21e8,0x11d21f46⤵
- Executes dropped EXE
-
C:\Windows\TEMP\sdwra_2848_1399606545\service_update.exe"C:\Windows\TEMP\sdwra_2848_1399606545\service_update.exe" --setup6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --install7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2848_1604365873\explorer.exe"C:\Users\Admin\AppData\Local\Temp\scoped_dir2848_1604365873\explorer.exe" --pttw1="C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yandex.lnk"6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2848_1604365873\explorer.exeC:\Users\Admin\AppData\Local\Temp\scoped_dir2848_1604365873\explorer.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=1244 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x2b0,0x2b4,0x2b8,0x28c,0x2bc,0x5b21d8,0x5b21e8,0x5b21f47⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\pin\explorer.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent /pin-path="C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.lnk" --is-pinning7⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids.xml"6⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source2848_1803224811\Browser-bin\clids_yandex.xml"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=searchband --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=searchband --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source2848_1803224811\Browser-bin\clids_searchband.xml"6⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --run-as-service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=4656 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x258,0x25c,0x260,0x234,0x264,0x1217ae8,0x1217af8,0x1217b042⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --update-scheduler2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --update-background-scheduler3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exe" --statistics=https://api.browser.yandex.ru/installstats/send/dtype=stred/pid=457/cid=72992/path=extended_stat/vars=-action=version_folder_files_check_unused,-brand_id=unknown,-error=FONT_NOT_FOUND,-files_mask=66977119,-installer_type=service_audit,-launched=false,-old_style=0,-old_ver=,-result=0,-stage=error,-target=version_folder_files_check,-ui=E5BCC085_5B14_43F5_B6CA_A236AFF0073B/*2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --progress-window=458818 --ok-button-pressed-time=454578598 --install-start-time-no-uac=4562815591⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id= --annotation=main_process_pid=884 --annotation=metrics_client_id=db8ac6cff7cd483b8988ca5dda043d7a --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x188,0x18c,0x190,0x164,0x194,0x720fa3b0,0x720fa3c0,0x720fa3cc2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=2032 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Storage Service" --mojo-platform-channel-handle=2328 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=ru --service-sandbox-type=audio --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Audio Service" --mojo-platform-channel-handle=2524 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Video Capture" --mojo-platform-channel-handle=2876 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=3228 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --mojo-platform-channel-handle=3428 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=3440 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --mojo-platform-channel-handle=4124 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=speechkit.mojom.Speechkit --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Speechkit Service" --mojo-platform-channel-handle=4588 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5344 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4700 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=uwp_cookie_provider.mojom.UwpCookieProvider --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name=uwp_cookie_provider.mojom.UwpCookieProvider --mojo-platform-channel-handle=4704 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --mojo-platform-channel-handle=4640 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\browser_diagnostics.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\browser_diagnostics.exe" --uninstall2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --mojo-platform-channel-handle=5564 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=5880 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=6104 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4020 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6196 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4540 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4028 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5216 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5884 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5524 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4980 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5132 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6444 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4972 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=3996 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4840 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6452 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6004 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6168 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5896 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6172 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6556 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6464 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6748 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6752 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6600 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --mojo-platform-channel-handle=4924 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=9124 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --mojo-platform-channel-handle=1400 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=9196 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=3448 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=6072 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=4960 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=824 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=5816 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --mojo-platform-channel-handle=2624 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --mojo-platform-channel-handle=3192 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=3416 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=4232 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1692 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5204 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 --enable-elf-protection /prefetch:22⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=4228 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=59 --mojo-platform-channel-handle=1144 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=60 --mojo-platform-channel-handle=2940 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --mojo-platform-channel-handle=3684 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=3424 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=63 --mojo-platform-channel-handle=2460 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=64 --mojo-platform-channel-handle=4100 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=3692 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=66 --mojo-platform-channel-handle=3832 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=67 --mojo-platform-channel-handle=8868 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=68 --mojo-platform-channel-handle=8908 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=8852 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=9060 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=8520 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=2460 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=spell_checker.mojom.SpellChecker --lang=ru --service-sandbox-type=utility --utility-enable-offline-spellchecker --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Проверка правописания" --mojo-platform-channel-handle=6800 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=5532 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=75 --mojo-platform-channel-handle=2624 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=76 --mojo-platform-channel-handle=3760 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=1840 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=78 --mojo-platform-channel-handle=8616 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=speechkit.mojom.Speechkit --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Speechkit Service" --mojo-platform-channel-handle=8912 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --disable-databases --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=82 --mojo-platform-channel-handle=9232 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --disable-databases --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=83 --mojo-platform-channel-handle=6072 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-databases --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=85 --mojo-platform-channel-handle=8408 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-databases --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=86 --mojo-platform-channel-handle=9176 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=6416 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=8116 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=speechkit.mojom.Speechkit --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Speechkit Service" --mojo-platform-channel-handle=8904 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=90 --mojo-platform-channel-handle=7180 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=91 --mojo-platform-channel-handle=5316 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=92 --mojo-platform-channel-handle=8620 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=93 --mojo-platform-channel-handle=8880 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=94 --mojo-platform-channel-handle=8860 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=95 --mojo-platform-channel-handle=6588 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=96 --mojo-platform-channel-handle=6168 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=97 --mojo-platform-channel-handle=6800 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=98 --mojo-platform-channel-handle=4220 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=99 --mojo-platform-channel-handle=3700 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=100 --mojo-platform-channel-handle=3876 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=101 --mojo-platform-channel-handle=8432 --field-trial-handle=1928,i,13408458137216633844,4548470446138417031,131072 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --no-startup-window --disable-features --enable-features --external-app-data=null_data --external-app-null-path --install-start-time-no-uac=456281559 --ok-button-pressed-time=4545785982⤵
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666042680 --annotation=last_update_date=1666042680 --annotation=launches_after_update=2 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=4684 --annotation=metrics_client_id=db8ac6cff7cd483b8988ca5dda043d7a --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x188,0x18c,0x190,0x164,0x194,0x720fa3b0,0x720fa3c0,0x720fa3cc3⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:23⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=2004 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Storage Service" --mojo-platform-channel-handle=2316 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=uwp_cookie_provider.mojom.UwpCookieProvider --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name=uwp_cookie_provider.mojom.UwpCookieProvider --mojo-platform-channel-handle=3336 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --mojo-platform-channel-handle=3824 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:13⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=ru --service-sandbox-type=audio --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Audio Service" --mojo-platform-channel-handle=3992 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=speechkit.mojom.Speechkit --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Speechkit Service" --mojo-platform-channel-handle=2792 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=4120 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:13⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --mojo-platform-channel-handle=4140 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:13⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Video Capture" --mojo-platform-channel-handle=4104 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=5296 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:13⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4340 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\browser_diagnostics.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\browser_diagnostics.exe" --uninstall3⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4860 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5432 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:13⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=5484 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=6092 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=patch.mojom.FilePatcher --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name=Патч-сервис --mojo-platform-channel-handle=5504 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=patch.mojom.FilePatcher --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name=Патч-сервис --mojo-platform-channel-handle=6316 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=patch.mojom.FilePatcher --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name=Патч-сервис --mojo-platform-channel-handle=6308 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --mojo-platform-channel-handle=6208 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:13⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=6316 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=6208 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --mojo-platform-channel-handle=352 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:13⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6036 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 --enable-elf-protection /prefetch:23⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=hips_telemetry.mojom.HipsTelemetryCollector --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Сборщик телеметрии" --mojo-platform-channel-handle=5724 --field-trial-handle=1928,i,4537733304150063704,17676443660865216095,131072 /prefetch:83⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueTool\21.2.26.0\YandexRescueTool.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueTool\21.2.26.0\YandexRescueTool.exe" /uid:"2a500800-54eb-4e4c-86c7-74fdf67ba7d4" /yandex_uid:"6410452611666035486" /version:"21.2.26.0" /lang:"ru" /browser:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" /iv:"1" /report_dir:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueToolReport" /browser_user_silent_detect /detect_report_html:"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\RescueToolReport\DetectReport.html"3⤵
-
C:\Users\Admin\AppData\Local\Temp\YandexRescueTool\bct.exe/session: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4⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --no-startup-window --disable-features --enable-features --external-app-data=null_data --external-app-null-path --install-start-time-no-uac=456281559 --ok-button-pressed-time=4545785983⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666042680 --annotation=last_update_date=1666042680 --annotation=launches_after_update=2 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=3836 --annotation=metrics_client_id=db8ac6cff7cd483b8988ca5dda043d7a --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x188,0x18c,0x190,0x164,0x194,0x720fa3b0,0x720fa3c0,0x720fa3cc4⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1852 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:24⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=2004 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:84⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Storage Service" --mojo-platform-channel-handle=1864 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:84⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=uwp_cookie_provider.mojom.UwpCookieProvider --lang=ru --service-sandbox-type=utility --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name=uwp_cookie_provider.mojom.UwpCookieProvider --mojo-platform-channel-handle=3324 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:84⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=3620 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:14⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --mojo-platform-channel-handle=4312 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:14⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=ru --service-sandbox-type=audio --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Audio Service" --mojo-platform-channel-handle=3960 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:84⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Video Capture" --mojo-platform-channel-handle=4476 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:84⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=4288 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:84⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=4112 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:84⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1128 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 --enable-elf-protection /prefetch:24⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\browser_diagnostics.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.3.891\browser_diagnostics.exe" --uninstall4⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=3588 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:84⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=deep_links_provider.mojom.DeepLinksProvider --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="DeepLinks service" --mojo-platform-channel-handle=3800 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:84⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=3828 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:84⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4908 --field-trial-handle=1836,i,12061335873470923251,18422920695435043714,131072 /prefetch:84⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x45c 0x2401⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater --bits_job_guid={FA6C49E0-6570-49DE-87AE-C14A89FA2656}1⤵
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666042680 --annotation=last_update_date=1666042680 --annotation=launches_after_update=1 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=3508 --annotation=metrics_client_id=db8ac6cff7cd483b8988ca5dda043d7a --annotation=micromode=broupdater --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x720fa3b0,0x720fa3c0,0x720fa3cc2⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=2088 --field-trial-handle=1988,i,17609437324850538490,13982554095260716199,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1856 --field-trial-handle=1988,i,17609437324850538490,13982554095260716199,131072 /prefetch:22⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater-stat-bits --broupdater-stat-name=install --bits_job_guid={0542012F-B0A9-42E0-B591-67BD3A73CBC6}1⤵
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666042680 --annotation=last_update_date=1666042680 --annotation=launches_after_update=1 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=5900 --annotation=metrics_client_id=db8ac6cff7cd483b8988ca5dda043d7a --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x720fa3b0,0x720fa3c0,0x720fa3cc2⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1872 --field-trial-handle=2100,i,5779721000814244463,10257569548643015784,131072 /prefetch:22⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=2056 --field-trial-handle=2100,i,5779721000814244463,10257569548643015784,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater-stat-bits --broupdater-stat-name=dayuse --bits_job_guid={0C0060C2-3AAF-4A96-BC42-015AA7B82638}1⤵
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666042680 --annotation=last_update_date=1666042680 --annotation=launches_after_update=1 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=5180 --annotation=metrics_client_id=db8ac6cff7cd483b8988ca5dda043d7a --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x720fa3b0,0x720fa3c0,0x720fa3cc2⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1832 --field-trial-handle=1992,i,10792204502009489213,13304400089794022250,131072 /prefetch:22⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=2A500800-54EB-4E4C-86C7-74FDF67BA7D4 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=2128 --field-trial-handle=1992,i,10792204502009489213,13304400089794022250,131072 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"1⤵
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1666042680 --annotation=last_update_date=1666042680 --annotation=launches_after_update=2 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=4980 --annotation=metrics_client_id=db8ac6cff7cd483b8988ca5dda043d7a --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.3.891 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x720fa3b0,0x720fa3c0,0x720fa3cc2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.3.891\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
538B
MD5c819f1e51af93036e919e7c72c99b90a
SHA1b7e4a8a925a0791584e97f2d678e7154c12f569e
SHA25646f1f541ed7ac9642ff11ac2799dd230e8b1337fcbd4748a497514fa38a84e6e
SHA51272d03084b28cface3aed7c73558d7a2283c196cd1a251446710dcca6eed098c0f8b874618d3feffd9b9701e5cebad4e4022377704cecffdbe37a43586d1ad72e
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
2KB
MD5a02bf11107cc3654333d0d7c8bc54674
SHA19839ec40e946f99723f233af735cd29a9359d810
SHA25698b840df499041dc8c465cc7f260f8e434504b54b5016bc33cccd31ef1f7d951
SHA5125cee99a7e2440028f4dd25016bcb9704a4e0c3dd1a7a07e94be1a1ca95169ed071822d2cb2b41bf82263c8cf732f1c70b4fff6404476b09f7b7e34ad0a578cf5
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
2KB
MD5a02bf11107cc3654333d0d7c8bc54674
SHA19839ec40e946f99723f233af735cd29a9359d810
SHA25698b840df499041dc8c465cc7f260f8e434504b54b5016bc33cccd31ef1f7d951
SHA5125cee99a7e2440028f4dd25016bcb9704a4e0c3dd1a7a07e94be1a1ca95169ed071822d2cb2b41bf82263c8cf732f1c70b4fff6404476b09f7b7e34ad0a578cf5
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
2KB
MD5a02bf11107cc3654333d0d7c8bc54674
SHA19839ec40e946f99723f233af735cd29a9359d810
SHA25698b840df499041dc8c465cc7f260f8e434504b54b5016bc33cccd31ef1f7d951
SHA5125cee99a7e2440028f4dd25016bcb9704a4e0c3dd1a7a07e94be1a1ca95169ed071822d2cb2b41bf82263c8cf732f1c70b4fff6404476b09f7b7e34ad0a578cf5
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
4KB
MD55eabfb3ef98282c47f022a6eb3b21981
SHA1bffd53dc621687c377838a9c1ed55db7d0336394
SHA2565dd04f867e0dd72040b4a773f6e68a21953adaef68c56c6da366a567eadd9cb8
SHA5120a89f4a67524ec16204ec0f5b954d03a794b9babd1fbe9db50872e87303082f40a42b90a28ea08d2d2640a75a354c0fa31ce48db794c98f6c11d34dbb506967e
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
4KB
MD515b8de8b2fc0f03f61aa8e997edad2ad
SHA1b41e302e695741f6805596ec43ea8bfcf5ae48bc
SHA256352b9748c99bfa0e781f73b8ae0c8c2d1e38f035ed1dfd423f31c3614c7657a8
SHA5128ffb720ee4b2edfc3913a6faa4c78ad0fb91269867fa7ba14775630a89380d30f0536bf3486ec6c675ffd6b7643eff5d6dda25a6d8520dc1a159a97d861830a4
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
4KB
MD515b8de8b2fc0f03f61aa8e997edad2ad
SHA1b41e302e695741f6805596ec43ea8bfcf5ae48bc
SHA256352b9748c99bfa0e781f73b8ae0c8c2d1e38f035ed1dfd423f31c3614c7657a8
SHA5128ffb720ee4b2edfc3913a6faa4c78ad0fb91269867fa7ba14775630a89380d30f0536bf3486ec6c675ffd6b7643eff5d6dda25a6d8520dc1a159a97d861830a4
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
5KB
MD5b588f8da006b457e892dc8e03ad0ca47
SHA19d14d112e311dac646eafef2325b4c649e657d61
SHA256d0dc4389478b020b1d12c5e0524f2782c0f89d09089971945cb937d766190fc7
SHA51271743d9f259e83f516ed5492f01157ee2333301431fecea5e3ff4ef257847dfe2f8698b8e3b99bb590bf499b8c6e611a808b7a561805eb48df151a52171f8ea9
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
5KB
MD5c32da1539d53be3442bcbba7d5da63b9
SHA16e947435a5a23970daa352b377f712fc93a19e01
SHA256b71781b1b7543cb872a5cac143c474ea8f302ee880a486b5aec2b2ea14d1163e
SHA5125edd528b6c07761787599ea7ef6c5201df06872042c098814a54970bd2894ed88e785d999cbfafa1d9e395d1b9ca3ead0b8c50c7e70f1913a13498b0650c7c79
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
8KB
MD549d8ca2424d99ea5b7c36ad3594f67b0
SHA12fe1132d1160ea495cadbe99a97a509ce6d6e361
SHA256784c94ab02a2bfacfdc73839fb24f842d7e01fdae99c69218166d80aa316475b
SHA512478bbe6173ce210e8286df1d0900c51243dccb7323bd9879f1041fc4f09e000687168e4112e5a2472559796c5da7e21f50bfe0a086eea55d81c3d3e589f7d13e
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
9KB
MD552a5ec11468f0e3b73c4a777a689f716
SHA180bccd797322c7c3b04add05da9eefd3206e0174
SHA256e50e190f7502fd6f2ecf190656b518c453de6f55c723e1351dfa30a67dcc6246
SHA51253caff8f9a62c7be1834c9da58ff43bea698df5c8dd2b6c2ac661b3a043e417bc2262b21caafc1b1df89ef5ccf6c1c99db89494faf4cefc73b2326adf6b13f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
1KB
MD540b62f02adad7b3c2847e572ea380c1c
SHA165165794300a0f9c378f4a5df2c33feb0a437d5f
SHA256d0c9d09393336f8ee3436c2a7ce50de7611080e6fe9eabb9e2da1cbee5d1a49b
SHA512e2593dcbabede3855fb0b5c86d3e075c55dada4f365d1637c9d96174aae83f622d482379c1a161b152b071c007d74a84f367e19a58274da3239a0503a3f56884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2Filesize
1KB
MD50e770a2b0e01305dd71665b0cfdcf454
SHA19e3b745dc0392dd47a343df58f0f38eede6bca8b
SHA2565f2bb6c904b96792e09f33052fd72befc18a38cb78c036178dddd3b2e546f48d
SHA512f043f4c79f5e6631ffed876975dc527076459e14c3d59df10b8d1c12e06c8d3ed00cf6f5c96b92d48e7a01b2ee82e76e40da9f406327709d435faf0da88aeda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_EBD7B8AF3A6D56C51CDE1B85E8C855A8Filesize
1KB
MD54d9375432abf92e0539d16a7163a06a5
SHA139c76f07dc176b89b4c52b0acd6f05c48a9bc276
SHA25607104cd870c3f61c60c514a59f37262ceff688fbb53d016e777f513262f7db70
SHA512a0d2e907249b85f09a18390693170a819ddb8828d2c03318713d8b9a56508e82ac19308bb8e37e34271f52d9d63c0624eddc03885788b5f5b49fa7e6ea47b4b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2Filesize
727B
MD53dc4181e96e768b9f4bbf41d1afa1dc1
SHA19ee79c2f26bf520c4e8a3b36daff9ce8e6e3cca8
SHA256a72e1936399b803b5c282aa625b1dd2e3c924897ba728887035ebd30a4e9eae4
SHA5128c6c6ec2b6513697995aac13b9f946a7f5442cea77d0d3053ae9cf0d7dedd6942c8eceabfcd0380156403002bea026b3b18d4926fec92a146faf41f0144a7958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBFilesize
471B
MD5da5a9f149955d936a31dc5e456666aac
SHA1195238d41c1e13448f349f43bb295ef2d55cb47a
SHA25679ac574c7c45144bb35b59ff79c78dc59b66592715dea01b389e3620db663224
SHA51260d7d1f5405470ba1e6b80066af2e78240acbea8db58b5a03660874605178aebaa9ce342ca97f17798109e7411e82466db5af064e39eaddc05410f2abe672f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554EFilesize
1KB
MD581afaa383e62ab9fb5c109a8085af9ab
SHA12e97af515e58fbd5912764d866f0586c850e9517
SHA256a29b6d44e6ba93676969a41736a669b958c5bbdad39961105a5d3ce2a84d94b2
SHA51215c7a56406e19f8e259e838b67f6c3b8675aa266a8daadff28198a3cd9c0af65cd6ad9273eca126070ed1090f1e50d500fb32e8149a64a4fff5e5668157e787a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
1KB
MD542198b52f6db40a5d0aeaeccb8d79ba2
SHA15619e78fc43bf2cb49fbfc6bdbf3f1625df166a4
SHA256f4301ed013980f23ee45db7e47cbced2a11d6820de70631a24189f5e0c918212
SHA51240dd68133c3e1dd2ca9fb708d511bac30fa6788c1401e498452d4110d9223a13fb8c023221c7e52a2eed6ecc9466ec3fa5900596db026119fe05c57043e91d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BBFilesize
727B
MD5e48b6e4b5351b7f68acc6375f58b4832
SHA1b17b7199b60c22b91a3df390d7a1c7874c7892a9
SHA256fed4553c22581ce3e71b78d3d45bddc8137beb99d2ff71a5423da909d6848d8c
SHA5125f3af281f1ec2292f0a0a905ad24a07c793c8e8ac0be9a0c86e9c1588b7f9cd6028c70433d7c228d60c7c9dbe1a1d3dd0afd3bf3795b388b6d48444edb1444b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
508B
MD5f74db18605da39c14691c1c02f17ad54
SHA12368b8b69ad40d7e03a1af91131dbb2ee2b0264e
SHA256b534c829f54768d0691d5c1db1120d18b7ee62116c50e539edf871a55efde67f
SHA5123bec0d4bbdcde3b635af89796aab9b493c0b033a6577c0066e8e8269d24c0a501cd5f1f0a0942a72347dad34a9e4a7ae93c7f3c454e776777d7b12b76ebeef9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_BD3730E24B5091FBD030C756E510C3A2Filesize
536B
MD537a77e4f5f75a379d63cb23f75e5379c
SHA1b05ec6d86eec9995a06d27ebc489d15133409346
SHA256eb1ebbcbf1f48e10026259c44b504ca36655ef1b1c8d1655ecfe4ea3cb080031
SHA5124a658b2b0d89a95f4ca2081b3fcc2398e57a3e2e02e63cd0be13e7e7cb6b1a2a567ab06145b4b33d97c68e2deabb293be5c678092f091381bc8c2c30c6c65886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_EBD7B8AF3A6D56C51CDE1B85E8C855A8Filesize
540B
MD556d0acd7151b11eb07b8f736d7bd787c
SHA16ae39d82066595a1a39172b06bd187d2e5c9c116
SHA256a123a14f27bc2df0ccced373967a2c703f53cf342a4953d979aa663fe0c542e3
SHA51237df477667c9b322566e265ced267fa07c3b0e85000b16002e16d1d1bb3a1bbc0e6309e23401dbbc68ae6c4fc67af64fc2b3a8b05bea1b46d3b3c66f836dfc8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2Filesize
434B
MD54d69d7019736e8062dbf437b8886a268
SHA199607182f7e2fc4a6bfe64cd503b61ed54cedccd
SHA25674b1ea5ac62e08d93d60073b6867685d3bdbe86989291603ea681fa70ae73ebd
SHA512051aa609e4105d05da3169bdc134abbdf752a9076d6ef86106126175657b0c3ecaf990f83923b24f28c3631abc6e44406beb8400497ba0ebe437909d2802d6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBFilesize
430B
MD57563cb6d3b112bf5c6e0040a1395adae
SHA1ae6cb0630664193d6451c37799a9d8d65d365b10
SHA256d0299fe74e012330f6b461df13ac8dedf0349d0d6aa0f201e74bc139f5bdfc07
SHA512b20c923432b992219a2c0c89758631101cc9e72bb3f003f657a22a5e35aff1cf9b8c3716fc7b32b3b358475a1973187f04f4285c347392092b5a24a0b4364e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554EFilesize
536B
MD5bc0b8ba50e301e8161b06a16c1cd096f
SHA16895213068a3328f7968b6bd7f35acf55850547c
SHA256a633e78d7cc1dbd4af077983729a0f11dfb893ad907439a8b4d88b0e89e13474
SHA512602f7ce1251a3cfe5f87917bf66ba3575fa1abc4f318a39444631940a0457038ad78d487df5b0aa156085aea7a08239bff767ad01143ed5990429f31c37ce8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
506B
MD5951c1d54cdcc681c3e2d7dcc3450c28d
SHA1af76b3422c6d37f15a277c7ae0741b986528b350
SHA25627eb8ce9bb90b568566aad49c9e2e2246d61501075ba07692d0e7ad41a9c1c44
SHA512603f01ab9460231d302ab6114d27d2bd77ce8a821774afc1b79fabe109c8d339d2f27a36600a40660e3a3886907ca72e597ee54cb52792e686c46b3bf55cd995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BBFilesize
442B
MD5f3e9bef5e8dd99efe9787648fde747a0
SHA165ff7b94c20054d0006aa331f04e9a1c79e2770e
SHA25631e1ebdba0c233465cca2fffa2a06a8ffaef9e3f3ab23aad7b27988d0b023236
SHA512ee6a0068fad09746a656fd1fba5bce186057d48986469271bcd79829418496dfe5085529febe1a74ed6cc8e0282b0b8dc8b9f1500201ae2707da429b1f680175
-
C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\BRAND_COMMONFilesize
23.3MB
MD5105d3263b0bca342b425fc45702c8856
SHA100180722d29af289bb7d2138a52b9d784ce367da
SHA2567547bc1f22cb361a4e644f899f8494faa013e15f05b75b77e1ea596532dc4fee
SHA512f6d3a7a25af1c10bbf5fb18b406f30c2c7d92778731f6b6d3eb6f181bc7854e920f99e1f55d2fdc0484bd1bd9bb13942ef13da85d1823c1f5cba16568cb45efb
-
C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\BROWSER.PACKED.7ZFilesize
90.8MB
MD55e99de825a34c299b8eef00c8d475e3d
SHA16fc1d9ef19f3d2aae0fb4ac596afbb24b408d83d
SHA2566f945efb7783b3ba9b8b48ffef9dc62322d11d51c401bbeaa1cf0aebf768b4ed
SHA512dd272ce4dd7f4529fb4b4a182cab7fa63bae0f455ea5bf843888c59d9fc13d1564b0f436b5afcd2c3d449979dcd82e0c71f45b6ae54e41e1ebbb649dd060e68a
-
C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\brand_yandexFilesize
2.1MB
MD5cff7f43a37e2081aa5271b2e42e20699
SHA19d50fec6b4b583e6b90cbc6906bb6838ded606d8
SHA25658ee5e657246dadd99f6194ffe082a27a8896aaa4500ff6773054a3929a912fd
SHA5124eb33ae0d9c9afb8116c9454b1ce06cefc6f59f21463ba9c04d45ed09b3fe61d1ef3aee1570e92d2657d4f6d33a603288f5ff5c04464bb6da75e16002763e2de
-
C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\YB_B8AB5.tmp\setup.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\clids.xmlFilesize
599B
MD5dae47d5fb36af27a9869750c11f52494
SHA1366629747a061c7bd6a6883f5364734cecfc697a
SHA25637ec2fcea5119863c67d94c2d269ec242e294cb76c9674e793d7280b6fd13c90
SHA5126937d3a2f3c4ecd3544a473a79808f1932e036cbafe6bff11d51f5d131fd8b6e594dbdfb254f96f49177cac5517e536bc14d855beaf3c81349ddbf7324bf79b4
-
C:\Users\Admin\AppData\Local\Temp\distrib_infoFilesize
293B
MD55ff4663cf4ed5b1c4c7e84ae7a26484b
SHA1738deb4f237c34acab7ecf6a2899c7bd94ecd34a
SHA256f69eb6cd9983e819f7c1273598046ace4ef35c97cc651b89b460bb05dbd58c81
SHA512f9f7a15bd4d811d0a0a986d24b18d76434f89f81f6554cf0f707a0298a26f0732389e85394d186dd22a6c0306b8568c94d5583891196328e0e3945f44af59bbc
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
20KB
MD578a06d4f38dabca1c9b97e90a2c64471
SHA12b0f44a44fe99cdc5c5dcf485af73bc95ec11d9b
SHA2563734d79bcf1613152da81889ece14dce8186011e90b8212f4088864978746754
SHA5122e8e68a9ce0ac3c39aeae7bebfb739bb11567699949deba04f98dfee8934672c2f5d24746b98a294d6473df584a22373ee2413e1f05e0cef7b6c2a2d68cf4595
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
20KB
MD578a06d4f38dabca1c9b97e90a2c64471
SHA12b0f44a44fe99cdc5c5dcf485af73bc95ec11d9b
SHA2563734d79bcf1613152da81889ece14dce8186011e90b8212f4088864978746754
SHA5122e8e68a9ce0ac3c39aeae7bebfb739bb11567699949deba04f98dfee8934672c2f5d24746b98a294d6473df584a22373ee2413e1f05e0cef7b6c2a2d68cf4595
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
27KB
MD5c0024e88178fac8542070a9b79060fdd
SHA14cf0d2ef632c006609387d39b07ab0b2e36ac47c
SHA256aef88e2de396dd823b6be14cdc86bcf08a2488e8526e207c204902ce5f908522
SHA51277b269b76df6eab897f971038590064aaf85931f39e8725537f68d7f8764c9d2036e6875070d796430250d496393c73f91225c31ea84c9b7613dfc38b4243760
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
28KB
MD573fe3d1900dce2250c04d3ba3e0c8889
SHA1654a872686f1b8b1e653a38e0cf7e7f63b44a3c1
SHA2560eeaad99a2679baea41b71ba3e20d60cdd038f1e68cdb4638c58a6f2a1a9dfb1
SHA512f4b2df9b62fbcdcf2b398261cdf9a745a845378a4fe17fd7ad15849161f2e7a694ba22ee6bd350a9ea0eb074400de4dc7b69651aa4e9378f72e264530e2a5c68
-
C:\Users\Admin\AppData\Local\Temp\master_preferencesFilesize
129KB
MD5ea23ca99cef3154fa52e403162fbfbb0
SHA17b6bf4ef68cf929fbe2a8a5bd06577c68e19b8ba
SHA256c23a22d152a3a2a12104c63477dc742d18b9624797048e46f76457a8eee7811b
SHA512b213e9280c3944c053ba8cbd0f9b211a1f3c3bd2e36c8b1a4363040b69ea1822dd90803067b383008f84456bf8f53000d710b744fce936f5fab15aa2cdae3170
-
C:\Users\Admin\AppData\Local\Temp\master_preferencesFilesize
129KB
MD5ea23ca99cef3154fa52e403162fbfbb0
SHA17b6bf4ef68cf929fbe2a8a5bd06577c68e19b8ba
SHA256c23a22d152a3a2a12104c63477dc742d18b9624797048e46f76457a8eee7811b
SHA512b213e9280c3944c053ba8cbd0f9b211a1f3c3bd2e36c8b1a4363040b69ea1822dd90803067b383008f84456bf8f53000d710b744fce936f5fab15aa2cdae3170
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2848_1604365873\explorer.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2848_1604365873\explorer.exeFilesize
3.9MB
MD57600b48ce4fb19c29eae3079d826c699
SHA19306e894d2645f71a49a3006b5046896a9917ef9
SHA256f5e44bb904f6fe2b59ca129b53c44d7e25f6ce0b65a51203a4a23a6dfe40871b
SHA5121a11be3bc8487f1ec7168d7843674a5192b737f28be66a91fe073d824d69605608633b0ca7fad845dedb22f46849b89619f547e10f360f32ff49998fd9daff6c
-
C:\Users\Admin\AppData\Local\Temp\website.icoMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\yandex_browser_installer.logFilesize
5KB
MD56674b91388f10247327a49afa81bd8c1
SHA100c04ca0541085c2b470b61c204222eed68a893f
SHA2566ac963074096dcc52cd85f6c4051e739ef44459cbc165d2c9b14f9408d987a98
SHA5125814ebf91b8250413a88f751918bf96b8412a20abf17ecc037ba7eb2d8583ffafeb21ac4d2828cd142f2f027c2854028f2dec122bf2819d44f139bc0ea3f541e
-
C:\Users\Admin\AppData\Local\Temp\yandex_browser_installer.logFilesize
22KB
MD5e5d67a0778b8d65ccf77ad3c4332e0cb
SHA18254e583c84fb5640946ef35a997cd9284e23d9f
SHA256bbf7ec2f800f131d07c452e755d0a53281df2443bdf49fc7ac7c4acde91c261d
SHA512270dde4413869e63bfd029cead2a88595e88756775df4d5c0bbc2b44548fa24a019e7efb98b74993512c284af90123937b09872c6751ba3bace9431d550b4a96
-
C:\Users\Admin\AppData\Local\Temp\ybEF85.tmpFilesize
149.8MB
MD5ff228e3e10f4d98d961e8a361861180d
SHA130fb83fafd7e79ed0ecd11a5231773d46a83e9f7
SHA256b64ea939b798557ffe48495520fb4a0e249a30d316cefc8c4ceca021b4b091ad
SHA5121763b1fc773aa4a3f6e34157751b7707467916ffee91d0ddf2096fe2bc5bffe677229de1ed35a47d35af4c25139d624189a8d5c418de8174126aef0f0bfc85e9
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeFilesize
591KB
MD510d2e0956493b129149705225fa3efb3
SHA1547ca5cb2eb4ad2dadb93e68869d1d8b26b395c1
SHA256a439fddafa27eacf7bfd86fd46c0683f9cd31c0a752b9abc522be77f295f1b1e
SHA512df4769611bf5d9a7458e641c97134ad2553bf01a834b2d08e1919153189860fce42cc712ea5182211f03d5c2c6d42967cd43129323adf21b146f21aaab04d253
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeFilesize
591KB
MD510d2e0956493b129149705225fa3efb3
SHA1547ca5cb2eb4ad2dadb93e68869d1d8b26b395c1
SHA256a439fddafa27eacf7bfd86fd46c0683f9cd31c0a752b9abc522be77f295f1b1e
SHA512df4769611bf5d9a7458e641c97134ad2553bf01a834b2d08e1919153189860fce42cc712ea5182211f03d5c2c6d42967cd43129323adf21b146f21aaab04d253
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeFilesize
3.8MB
MD52fadcc66fdf395c8fd19a424745a855c
SHA1b40174f66741be5f5afc814b3797dd5af7891b30
SHA256d43da70412b55377532192ab6658074bd73592ab1552a1bb53edf823ee655972
SHA5123ac2d369e2708309bac2796071bbd53c32fb462ea0373898c5701d3d776b4ce573eb28275148cebff2f2602cf8922f4dd7ddd9ecc533988a1a05e8578b6b6633
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad\settings.datFilesize
48B
MD5b07ddfe1481eb8ab474f8413f97612c0
SHA1ddfda8f079a239dc6f80c6d13085d37b570e50c6
SHA25653d61d59437bea683daa78196fcc9d4130fbbafc073af79d3797f47387a01249
SHA512306813bf31e842ebe1aaf6a69e538e35806d69b70ce50f411b3315d7157c9aec6fc365e2258af8acdb1eb3cc42500c5efd3ef854fd77adcf4fc988c76820f26b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\yandex.websiteFilesize
492B
MD5c237fc112a9d718f8132e915847afd2f
SHA1854bce4c4b3707fcd7f88eaca8c590590e8914d4
SHA256f96678a810127b62f806b947351819d58da5a2d49d83d5157090b72c095fd788
SHA5124e2872cdf225c14f8ec2560b7ca033f225e3d32ceb4928200c84a33d6e1f6b8f2fb0a2c37e3d9eec025da5849164f58a5812006b1f7013d12579c88005eff79b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yandex.lnkFilesize
2KB
MD55d7f1986b13afd325fe1c7b2f0aea25d
SHA134f2b2f095c5e81bf566ac59da75cf6b8dde18e1
SHA256347317bf027428e6383a60741aa0a26c715d542c224b05c342d81b20356c5c98
SHA512e59fd9cd941ac87e3076175faaf8229d32aed05fb14b5efb4559062aa4937ec0a17ad237210d5d28863149058a480f27eb3f01a289523fa1d0c8d32bc836d27a
-
C:\Users\Admin\AppData\Roaming\Yandex\uiFilesize
38B
MD5a1d21bffbb48cce6ad8a75c984d4f0f0
SHA1c591bb20188db37468f4ba39669250d56d17b907
SHA256e659d29f527887ca407890be27a65ffe51d12d189c913043b3f1366ac2fe13f4
SHA512db670598daa43d06725b0e992ded5ad1ba00a4d73a008366e8b1deb690d3fcb40e66bd2840d4be04c998087eb6ab2fae71adcb60c261e3c95a0314d7de22b788
-
C:\Windows\TEMP\sdwra_2848_1399606545\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
C:\Windows\Temp\sdwra_2848_1399606545\service_update.exeFilesize
2.6MB
MD5f5aef523c78f170e1c01c7d2bd80d207
SHA197a966c3941a7202d7e62979c21b2244e853d1b1
SHA25648ac6ff5c8bd6bca8428cb03badd8ec91ea1ff32ee2720958b7806d5c2e6cae0
SHA512f5d0cde11c38fc9f56911cd376003c17972e5724edb9b424ea3bf2da08bbd054cc830c16c16bdd5d3de463956ef686ef1b89c00f97eb3736f4c2588642a1d868
-
memory/320-230-0x0000000000000000-mapping.dmp
-
memory/520-251-0x0000000000000000-mapping.dmp
-
memory/544-242-0x0000000000000000-mapping.dmp
-
memory/716-148-0x0000000000000000-mapping.dmp
-
memory/744-213-0x0000000000000000-mapping.dmp
-
memory/864-174-0x0000000000000000-mapping.dmp
-
memory/876-212-0x0000000000000000-mapping.dmp
-
memory/1200-171-0x0000000000000000-mapping.dmp
-
memory/1244-195-0x0000000000000000-mapping.dmp
-
memory/1520-233-0x0000000000000000-mapping.dmp
-
memory/1520-210-0x0000000000000000-mapping.dmp
-
memory/1792-132-0x0000000000000000-mapping.dmp
-
memory/1820-262-0x0000000000000000-mapping.dmp
-
memory/1880-211-0x0000000000000000-mapping.dmp
-
memory/1996-357-0x0000000000000000-mapping.dmp
-
memory/2168-209-0x0000000000000000-mapping.dmp
-
memory/2240-264-0x0000000000000000-mapping.dmp
-
memory/2296-261-0x0000000000000000-mapping.dmp
-
memory/2304-374-0x0000000000000000-mapping.dmp
-
memory/2392-248-0x0000000000000000-mapping.dmp
-
memory/2436-178-0x0000000000000000-mapping.dmp
-
memory/2832-216-0x0000000000000000-mapping.dmp
-
memory/2848-144-0x0000000000000000-mapping.dmp
-
memory/3092-214-0x0000000000000000-mapping.dmp
-
memory/3216-354-0x0000000000000000-mapping.dmp
-
memory/3220-338-0x0000000000000000-mapping.dmp
-
memory/3228-220-0x0000000000000000-mapping.dmp
-
memory/3228-192-0x0000000000000000-mapping.dmp
-
memory/3248-217-0x0000000000000000-mapping.dmp
-
memory/3268-205-0x0000000000000000-mapping.dmp
-
memory/3532-224-0x0000000000000000-mapping.dmp
-
memory/3576-227-0x0000000000000000-mapping.dmp
-
memory/3768-140-0x0000000000000000-mapping.dmp
-
memory/3984-138-0x0000000000000000-mapping.dmp
-
memory/4332-244-0x0000000000000000-mapping.dmp
-
memory/4436-181-0x0000000000000000-mapping.dmp
-
memory/4552-258-0x0000000000000000-mapping.dmp
-
memory/4588-223-0x0000000000000000-mapping.dmp
-
memory/4740-384-0x0000000000000000-mapping.dmp
-
memory/4936-185-0x0000000000000000-mapping.dmp
-
memory/5024-198-0x0000000000000000-mapping.dmp
-
memory/5044-378-0x0000000000000000-mapping.dmp
-
memory/5164-270-0x0000000000000000-mapping.dmp
-
memory/5180-396-0x0000000000000000-mapping.dmp
-
memory/5244-341-0x0000000000000000-mapping.dmp
-
memory/5248-391-0x0000000000000000-mapping.dmp
-
memory/5252-346-0x0000000000000000-mapping.dmp
-
memory/5396-274-0x0000000000000000-mapping.dmp
-
memory/5488-276-0x0000000000000000-mapping.dmp
-
memory/5504-279-0x0000000000000000-mapping.dmp
-
memory/5508-363-0x0000000000000000-mapping.dmp
-
memory/5528-283-0x0000000000000000-mapping.dmp
-
memory/5592-288-0x0000000000000000-mapping.dmp
-
memory/5664-294-0x0000000000000000-mapping.dmp
-
memory/5744-299-0x0000000000000000-mapping.dmp
-
memory/5748-398-0x0000000000000000-mapping.dmp
-
memory/5760-369-0x0000000000000000-mapping.dmp
-
memory/5784-303-0x0000000000000000-mapping.dmp
-
memory/5868-309-0x0000000000000000-mapping.dmp
-
memory/5904-314-0x0000000000000000-mapping.dmp
-
memory/5960-317-0x0000000000000000-mapping.dmp
-
memory/6040-324-0x0000000000000000-mapping.dmp
-
memory/6100-328-0x0000000000000000-mapping.dmp
-
memory/6128-334-0x0000000000000000-mapping.dmp