Analysis
-
max time kernel
314s -
max time network
318s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2022 19:29
Static task
static1
Behavioral task
behavioral1
Sample
Yandex (1).exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Yandex (1).exe
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
Yandex (1).exe
Resource
win10v2004-20220812-en
General
-
Target
Yandex (1).exe
-
Size
2.2MB
-
MD5
841b79c3bd9ef08da8616faa4df033f0
-
SHA1
eb1eb7a7b862360c64477ba1a0eb2b490c5530e3
-
SHA256
efb4786e8b964e62b97f4b60fd4d6ad2d14a4a112d76d920a19bc93bd4610f45
-
SHA512
14fc348bcd379bfffeb004f25988ccbcf35413039bd82c301575017a62fd44c516e20c43db818c8fb5170e9abfa1186179864983157241a268fa4f0a78c4c848
-
SSDEEP
49152:bILXlcHvCEPMae+z2b9lJ/gXDs+R+r5u8Qeg:sBcPHMae+Sb9lJ/YeKf
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
ybB933.tmpsetup.exesetup.exesetup.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeexplorer.exeexplorer.exeYandex.exeexplorer.execlidmgr.execlidmgr.execlidmgr.execlidmgr.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exesetup.exebrowser.exesetup.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser_diagnostics.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 2832 ybB933.tmp 3104 setup.exe 2104 setup.exe 2388 setup.exe 4104 service_update.exe 1652 service_update.exe 1844 service_update.exe 1984 service_update.exe 1848 service_update.exe 4056 service_update.exe 2724 service_update.exe 3980 explorer.exe 2084 explorer.exe 3972 Yandex.exe 4380 explorer.exe 2844 clidmgr.exe 3684 clidmgr.exe 4768 clidmgr.exe 244 clidmgr.exe 3996 browser.exe 2476 browser.exe 2256 browser.exe 3776 browser.exe 1612 browser.exe 4696 browser.exe 4012 browser.exe 5112 browser.exe 3900 browser.exe 4088 setup.exe 1860 browser.exe 1296 setup.exe 3832 browser.exe 2272 browser.exe 244 browser.exe 1608 browser.exe 472 browser.exe 3704 browser_diagnostics.exe 4924 browser.exe 1760 browser.exe 3540 browser.exe 4468 browser.exe 5152 browser.exe 5216 browser.exe 5236 browser.exe 5260 browser.exe 5312 browser.exe 5368 browser.exe 5424 browser.exe 5476 browser.exe 5548 browser.exe 5592 browser.exe 5680 browser.exe 5732 browser.exe 5788 browser.exe 5844 browser.exe 5912 browser.exe 5964 browser.exe 6020 browser.exe 6080 browser.exe 6140 browser.exe 3944 browser.exe 3940 browser.exe 416 browser.exe 5320 browser.exe -
Checks computer location settings 2 TTPs 19 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Yandex (1).exesetup.exeYandex.exebrowser.exebrowser.exeservice_update.exeexplorer.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exeexplorer.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Yandex (1).exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Yandex.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation service_update.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation browser.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation browser.exe -
Loads dropped DLL 64 IoCs
Processes:
browser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 3996 browser.exe 2476 browser.exe 3996 browser.exe 3996 browser.exe 2256 browser.exe 3776 browser.exe 2256 browser.exe 3776 browser.exe 2256 browser.exe 2256 browser.exe 2256 browser.exe 2256 browser.exe 2256 browser.exe 1612 browser.exe 1612 browser.exe 4696 browser.exe 4696 browser.exe 4012 browser.exe 4012 browser.exe 5112 browser.exe 5112 browser.exe 3900 browser.exe 3900 browser.exe 3900 browser.exe 1860 browser.exe 1860 browser.exe 3832 browser.exe 3832 browser.exe 2272 browser.exe 2272 browser.exe 244 browser.exe 244 browser.exe 1608 browser.exe 1608 browser.exe 472 browser.exe 472 browser.exe 4924 browser.exe 4924 browser.exe 1760 browser.exe 1760 browser.exe 3540 browser.exe 3540 browser.exe 4468 browser.exe 4468 browser.exe 5152 browser.exe 5152 browser.exe 5216 browser.exe 5216 browser.exe 5236 browser.exe 5236 browser.exe 5260 browser.exe 5260 browser.exe 5312 browser.exe 5312 browser.exe 5368 browser.exe 5368 browser.exe 5424 browser.exe 5424 browser.exe 5476 browser.exe 5476 browser.exe 5548 browser.exe 5548 browser.exe 5592 browser.exe 5592 browser.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
browser.exemsedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YandexBrowserAutoLaunch_45886AE68CD319C7351FF54A1DBD4B87 = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --shutdown-if-not-closed-by-system-restart" browser.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 16 IoCs
Processes:
service_update.exeservice_update.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1BA79029EC3FFD076F5DAC2F70A18685 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_10F204F67590689C25A3C1C3FBC116B1 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_10F204F67590689C25A3C1C3FBC116B1 service_update.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Yandex\ui service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1BA79029EC3FFD076F5DAC2F70A18685 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 service_update.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\_[1].js service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 service_update.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content service_update.exe -
Drops file in Program Files directory 5 IoCs
Processes:
service_update.exeservice_update.exesetup.exedescription ioc process File opened for modification C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe service_update.exe File opened for modification C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\debug.log service_update.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\bd8fbe33-041d-4b4a-8384-33163bbe22c4.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221111203442.pma setup.exe File created C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe service_update.exe -
Drops file in Windows directory 4 IoCs
Processes:
browser.exeservice_update.exeservice_update.exedescription ioc process File created C:\Windows\Tasks\Обновление Браузера Яндекс.job browser.exe File created C:\Windows\Tasks\System update for Yandex Browser.job service_update.exe File created C:\Windows\Tasks\Update for Yandex Browser.job service_update.exe File created C:\Windows\Tasks\Repairing Yandex Browser update service.job service_update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 12 IoCs
Processes:
msedge.exebrowser.exebrowser.exebrowser.exebrowser.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe -
Modifies data under HKEY_USERS 22 IoCs
Processes:
service_update.exeservice_update.exebrowser.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Yandex service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ service_update.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry browser.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133126724022582100" browser.exe Key created \REGISTRY\USER\.DEFAULT\Software service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Yandex\UICreated_SYSTEM = "1" service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" service_update.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow service_update.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" service_update.exe -
Modifies registry class 64 IoCs
Processes:
browser.exesetup.exesetup.exeYandex.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\SystemFileAssociations\.bmp browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexWEBP.R5677HHTL5HAGFNC4GY3WK5VEI\ = "Yandex Browser WEBP Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.infected\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.jpg\OpenWithProgids\YandexJPEG.R5677HHTL5HAGFNC4GY3WK5VEI setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.xml\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\yabrowser\shell setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexSWF.R5677HHTL5HAGFNC4GY3WK5VEI\ = "Yandex Browser SWF Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexJPEG.R5677HHTL5HAGFNC4GY3WK5VEI\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\SystemFileAssociations\.bmp\shell\image_search\command browser.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.pdf setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Yandex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexPNG.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexEPUB.R5677HHTL5HAGFNC4GY3WK5VEI\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-121" setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexPDF.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.css\OpenWithProgids\YandexCSS.R5677HHTL5HAGFNC4GY3WK5VEI setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexCSS.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open\command setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexFB2.R5677HHTL5HAGFNC4GY3WK5VEI\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-122" setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexXML.R5677HHTL5HAGFNC4GY3WK5VEI\DefaultIcon setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\SystemFileAssociations\.tif\shell browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\SystemFileAssociations\.webp\shell\image_search\ = "Поиск по картинке" browser.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexJS.R5677HHTL5HAGFNC4GY3WK5VEI\DefaultIcon setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexHTML.R5677HHTL5HAGFNC4GY3WK5VEI\Application\AppUserModelId = "Yandex.R5677HHTL5HAGFNC4GY3WK5VEI" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.fb2\OpenWithProgids\YandexFB2.R5677HHTL5HAGFNC4GY3WK5VEI setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.js\OpenWithProgids\YandexJS.R5677HHTL5HAGFNC4GY3WK5VEI setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\SystemFileAssociations\.gif\shell browser.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexCSS.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.gif\OpenWithProgids\YandexGIF.R5677HHTL5HAGFNC4GY3WK5VEI setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.tif setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexCSS.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\SystemFileAssociations\.jpg\shell\image_search\command browser.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexFB2.R5677HHTL5HAGFNC4GY3WK5VEI setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexCSS.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.jpg setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexTXT.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.jpeg setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\SystemFileAssociations\.jpg browser.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexHTML.R5677HHTL5HAGFNC4GY3WK5VEI setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexWEBP.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.css\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.webm\OpenWithProgids\YandexWEBM.R5677HHTL5HAGFNC4GY3WK5VEI setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexJPEG.R5677HHTL5HAGFNC4GY3WK5VEI\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-109" setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexHTML.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexTXT.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.swf\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexPNG.R5677HHTL5HAGFNC4GY3WK5VEI\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-113" setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexINFE.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexSWF.R5677HHTL5HAGFNC4GY3WK5VEI setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.crx setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexTIFF.R5677HHTL5HAGFNC4GY3WK5VEI\shell setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexXML.R5677HHTL5HAGFNC4GY3WK5VEI\ = "Yandex Browser XML Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.infected\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.xht setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexPDF.R5677HHTL5HAGFNC4GY3WK5VEI\DefaultIcon setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.crx setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexFB2.R5677HHTL5HAGFNC4GY3WK5VEI\ = "Yandex Browser FB2 Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\yabrowser\shell\open\ddeexec setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexCRX.R5677HHTL5HAGFNC4GY3WK5VEI\DefaultIcon setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexWEBM.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexFB2.R5677HHTL5HAGFNC4GY3WK5VEI\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexXML.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open\command setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexFB2.R5677HHTL5HAGFNC4GY3WK5VEI\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-122" setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\.tiff setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexFB2.R5677HHTL5HAGFNC4GY3WK5VEI setup.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\YandexINFE.R5677HHTL5HAGFNC4GY3WK5VEI\shell\open\command setup.exe -
Processes:
Yandex (1).exesetup.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 Yandex (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 Yandex (1).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 Yandex (1).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
setup.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeservice_update.exeexplorer.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exesetup.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exebrowser.exepid process 2104 setup.exe 2104 setup.exe 4104 service_update.exe 4104 service_update.exe 1652 service_update.exe 1652 service_update.exe 1844 service_update.exe 1844 service_update.exe 1844 service_update.exe 1844 service_update.exe 1848 service_update.exe 1848 service_update.exe 4056 service_update.exe 4056 service_update.exe 2724 service_update.exe 2724 service_update.exe 3980 explorer.exe 3980 explorer.exe 3980 explorer.exe 3980 explorer.exe 2104 setup.exe 2104 setup.exe 2104 setup.exe 2104 setup.exe 3996 browser.exe 3996 browser.exe 2256 browser.exe 3776 browser.exe 3776 browser.exe 1612 browser.exe 4012 browser.exe 4012 browser.exe 5112 browser.exe 3900 browser.exe 3900 browser.exe 1860 browser.exe 4088 setup.exe 4088 setup.exe 3996 browser.exe 3996 browser.exe 3832 browser.exe 2272 browser.exe 244 browser.exe 1608 browser.exe 472 browser.exe 4924 browser.exe 1760 browser.exe 3540 browser.exe 4468 browser.exe 4468 browser.exe 5152 browser.exe 5216 browser.exe 5236 browser.exe 5260 browser.exe 5312 browser.exe 5368 browser.exe 5424 browser.exe 5476 browser.exe 5548 browser.exe 5592 browser.exe 5680 browser.exe 5732 browser.exe 5788 browser.exe 5844 browser.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
msedge.exepid process 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
browser.exeAUDIODG.EXEbrowser_diagnostics.exebrowser.exedescription pid process Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: 33 3984 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3984 AUDIODG.EXE Token: SeDebugPrivilege 3704 browser_diagnostics.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 5344 browser.exe Token: SeCreatePagefilePrivilege 5344 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 5344 browser.exe Token: SeCreatePagefilePrivilege 5344 browser.exe Token: SeShutdownPrivilege 3996 browser.exe Token: SeCreatePagefilePrivilege 3996 browser.exe Token: SeShutdownPrivilege 5344 browser.exe Token: SeCreatePagefilePrivilege 5344 browser.exe Token: SeShutdownPrivilege 3996 browser.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Yandex (1).exeexplorer.exeexplorer.exebrowser.exemsedge.exepid process 4332 Yandex (1).exe 3980 explorer.exe 4380 explorer.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
browser.exemsedge.exepid process 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
Yandex (1).exebrowser.exepid process 4332 Yandex (1).exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe 3996 browser.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Yandex (1).exeYandex (1).exeybB933.tmpsetup.exesetup.exeservice_update.exeservice_update.exeservice_update.exeexplorer.exeYandex.exebrowser.exedescription pid process target process PID 4332 wrote to memory of 4968 4332 Yandex (1).exe Yandex (1).exe PID 4332 wrote to memory of 4968 4332 Yandex (1).exe Yandex (1).exe PID 4332 wrote to memory of 4968 4332 Yandex (1).exe Yandex (1).exe PID 4968 wrote to memory of 2832 4968 Yandex (1).exe ybB933.tmp PID 4968 wrote to memory of 2832 4968 Yandex (1).exe ybB933.tmp PID 4968 wrote to memory of 2832 4968 Yandex (1).exe ybB933.tmp PID 2832 wrote to memory of 3104 2832 ybB933.tmp setup.exe PID 2832 wrote to memory of 3104 2832 ybB933.tmp setup.exe PID 2832 wrote to memory of 3104 2832 ybB933.tmp setup.exe PID 3104 wrote to memory of 2104 3104 setup.exe setup.exe PID 3104 wrote to memory of 2104 3104 setup.exe setup.exe PID 3104 wrote to memory of 2104 3104 setup.exe setup.exe PID 2104 wrote to memory of 2388 2104 setup.exe setup.exe PID 2104 wrote to memory of 2388 2104 setup.exe setup.exe PID 2104 wrote to memory of 2388 2104 setup.exe setup.exe PID 2104 wrote to memory of 4104 2104 setup.exe service_update.exe PID 2104 wrote to memory of 4104 2104 setup.exe service_update.exe PID 2104 wrote to memory of 4104 2104 setup.exe service_update.exe PID 4104 wrote to memory of 1652 4104 service_update.exe service_update.exe PID 4104 wrote to memory of 1652 4104 service_update.exe service_update.exe PID 4104 wrote to memory of 1652 4104 service_update.exe service_update.exe PID 1844 wrote to memory of 1984 1844 service_update.exe service_update.exe PID 1844 wrote to memory of 1984 1844 service_update.exe service_update.exe PID 1844 wrote to memory of 1984 1844 service_update.exe service_update.exe PID 1844 wrote to memory of 1848 1844 service_update.exe service_update.exe PID 1844 wrote to memory of 1848 1844 service_update.exe service_update.exe PID 1844 wrote to memory of 1848 1844 service_update.exe service_update.exe PID 1848 wrote to memory of 4056 1848 service_update.exe service_update.exe PID 1848 wrote to memory of 4056 1848 service_update.exe service_update.exe PID 1848 wrote to memory of 4056 1848 service_update.exe service_update.exe PID 1844 wrote to memory of 2724 1844 service_update.exe service_update.exe PID 1844 wrote to memory of 2724 1844 service_update.exe service_update.exe PID 1844 wrote to memory of 2724 1844 service_update.exe service_update.exe PID 2104 wrote to memory of 3980 2104 setup.exe explorer.exe PID 2104 wrote to memory of 3980 2104 setup.exe explorer.exe PID 2104 wrote to memory of 3980 2104 setup.exe explorer.exe PID 3980 wrote to memory of 2084 3980 explorer.exe explorer.exe PID 3980 wrote to memory of 2084 3980 explorer.exe explorer.exe PID 3980 wrote to memory of 2084 3980 explorer.exe explorer.exe PID 2104 wrote to memory of 3972 2104 setup.exe Yandex.exe PID 2104 wrote to memory of 3972 2104 setup.exe Yandex.exe PID 2104 wrote to memory of 3972 2104 setup.exe Yandex.exe PID 3972 wrote to memory of 4380 3972 Yandex.exe explorer.exe PID 3972 wrote to memory of 4380 3972 Yandex.exe explorer.exe PID 3972 wrote to memory of 4380 3972 Yandex.exe explorer.exe PID 2104 wrote to memory of 2844 2104 setup.exe clidmgr.exe PID 2104 wrote to memory of 2844 2104 setup.exe clidmgr.exe PID 2104 wrote to memory of 2844 2104 setup.exe clidmgr.exe PID 2104 wrote to memory of 3684 2104 setup.exe clidmgr.exe PID 2104 wrote to memory of 3684 2104 setup.exe clidmgr.exe PID 2104 wrote to memory of 3684 2104 setup.exe clidmgr.exe PID 2104 wrote to memory of 4768 2104 setup.exe clidmgr.exe PID 2104 wrote to memory of 4768 2104 setup.exe clidmgr.exe PID 2104 wrote to memory of 4768 2104 setup.exe clidmgr.exe PID 2104 wrote to memory of 244 2104 setup.exe clidmgr.exe PID 2104 wrote to memory of 244 2104 setup.exe clidmgr.exe PID 2104 wrote to memory of 244 2104 setup.exe clidmgr.exe PID 3996 wrote to memory of 2476 3996 browser.exe browser.exe PID 3996 wrote to memory of 2476 3996 browser.exe browser.exe PID 3996 wrote to memory of 2476 3996 browser.exe browser.exe PID 3996 wrote to memory of 2256 3996 browser.exe browser.exe PID 3996 wrote to memory of 2256 3996 browser.exe browser.exe PID 3996 wrote to memory of 2256 3996 browser.exe browser.exe PID 3996 wrote to memory of 2256 3996 browser.exe browser.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Yandex (1).exe"C:\Users\Admin\AppData\Local\Temp\Yandex (1).exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\Yandex (1).exe"C:\Users\Admin\AppData\Local\Temp\Yandex (1).exe" --parent-installer-process-id=4332 --run-as-admin --setup-cmd-line="fake_browser_arc --abt-config-resource-file=\"C:\Users\Admin\AppData\Local\Temp\abt_config_resource\" --abt-update-path=\"C:\Users\Admin\AppData\Local\Temp\f93d8559-ff62-43ff-9058-15c6fca1d2d3.tmp\" --brand-name=yandex --distr-info-file=\"C:\Users\Admin\AppData\Local\Temp\distrib_info\" --make-browser-default-after-import --ok-button-pressed-time=422297459 --progress-window=196660 --send-statistics --the-interface-availability=190411288 --variations-update-path=\"C:\Users\Admin\AppData\Local\Temp\772e1ccb-db2e-4848-9a31-a9a01a486773.tmp\" --verbose-logging"2⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\ybB933.tmp"C:\Users\Admin\AppData\Local\Temp\ybB933.tmp" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\f93d8559-ff62-43ff-9058-15c6fca1d2d3.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=48 --install-start-time-no-uac=424125641 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --ok-button-pressed-time=422297459 --progress-window=196660 --send-statistics --source=lite --the-interface-availability=190411288 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\772e1ccb-db2e-4848-9a31-a9a01a486773.tmp" --verbose-logging3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\BROWSER.PACKED.7Z" --searchband-file="C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\SEARCHBAND.EXE" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\f93d8559-ff62-43ff-9058-15c6fca1d2d3.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=48 --install-start-time-no-uac=424125641 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --ok-button-pressed-time=422297459 --progress-window=196660 --send-statistics --source=lite --the-interface-availability=190411288 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\772e1ccb-db2e-4848-9a31-a9a01a486773.tmp" --verbose-logging4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\BROWSER.PACKED.7Z" --searchband-file="C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\SEARCHBAND.EXE" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\f93d8559-ff62-43ff-9058-15c6fca1d2d3.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --clids-searchband-file="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=48 --install-start-time-no-uac=424125641 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --ok-button-pressed-time=422297459 --progress-window=196660 --send-statistics --source=lite --the-interface-availability=190411288 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\772e1ccb-db2e-4848-9a31-a9a01a486773.tmp" --verbose-logging --verbose-logging --run-as-admin --target-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application" --child-setup-process --restart-as-admin-time=5134805315⤵
- Executes dropped EXE
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=2104 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.5.712 --initial-client-data=0x334,0x338,0x33c,0x310,0x340,0xa71198,0xa711a8,0xa711b46⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\TEMP\sdwra_2104_419317634\service_update.exe"C:\Windows\TEMP\sdwra_2104_419317634\service_update.exe" --setup6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe" --install7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\scoped_dir2104_1008626121\explorer.exe"C:\Users\Admin\AppData\Local\Temp\scoped_dir2104_1008626121\explorer.exe" --pttw1="C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yandex.lnk"6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\scoped_dir2104_1008626121\explorer.exeC:\Users\Admin\AppData\Local\Temp\scoped_dir2104_1008626121\explorer.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=3980 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.5.712 --initial-client-data=0x2b0,0x2b4,0x2b8,0x298,0x2bc,0x1201198,0x12011a8,0x12011b47⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\pin\explorer.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent /pin-path="C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.lnk" --is-pinning7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
PID:4380 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids.xml"6⤵
- Executes dropped EXE
PID:2844 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source2104_1575276260\Browser-bin\clids_yandex.xml"6⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=searchband --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids_searchband.xml"6⤵
- Executes dropped EXE
PID:4768 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=searchband --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source2104_1575276260\Browser-bin\clids_searchband.xml"6⤵
- Executes dropped EXE
PID:244
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe" --run-as-service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=1844 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.5.712 --initial-client-data=0x258,0x25c,0x260,0x234,0x264,0xe48ae8,0xe48af8,0xe48b042⤵
- Executes dropped EXE
PID:1984 -
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe" --update-scheduler2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe" --update-background-scheduler3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4056 -
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exe" --statistics=https://api.browser.yandex.ru/installstats/send/dtype=stred/pid=457/cid=72992/path=extended_stat/vars=-action=version_folder_files_check_unused,-brand_id=unknown,-error=FONT_NOT_FOUND,-files_mask=66977119,-installer_type=service_audit,-launched=false,-old_style=0,-old_ver=,-result=0,-stage=error,-target=version_folder_files_check,-ui=02EC3A33_790F_41DF_B54E_9759366F9F06/*2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --progress-window=196660 --ok-button-pressed-time=422297459 --install-start-time-no-uac=4241256411⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id= --annotation=main_process_pid=3996 --annotation=metrics_client_id=20bbe7db2a164b0f99cf77586f64978e --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.5.712 --initial-client-data=0x184,0x188,0x18c,0x160,0x190,0x7291a3b0,0x7291a3c0,0x7291a3cc2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2476 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=2052 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3776 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=ru --service-sandbox-type=utility --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Storage Service" --mojo-platform-channel-handle=2324 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=ru --service-sandbox-type=audio --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Audio Service" --mojo-platform-channel-handle=2912 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4696 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Video Capture" --mojo-platform-channel-handle=3048 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4012 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=3340 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5112 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=speechkit.mojom.Speechkit --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Speechkit Service" --mojo-platform-channel-handle=3436 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3900 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.5.712\Installer\setup.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.5.712\Installer\setup.exe" --set-as-default-browser2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4088 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.5.712\Installer\setup.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.5.712\Installer\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=4088 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.5.712 --initial-client-data=0x338,0x33c,0x340,0x314,0x344,0xbd1198,0xbd11a8,0xbd11b43⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --allow-prefetch --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --mojo-platform-channel-handle=3428 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1860 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --mojo-platform-channel-handle=4240 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3832 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4488 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=4204 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:244 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=4840 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=uwp_cookie_provider.mojom.UwpCookieProvider --lang=ru --service-sandbox-type=utility --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name=uwp_cookie_provider.mojom.UwpCookieProvider --mojo-platform-channel-handle=4484 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:472 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.5.712\browser_diagnostics.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\22.9.5.712\browser_diagnostics.exe" --uninstall2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3704 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --mojo-platform-channel-handle=5904 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4924 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --mojo-platform-channel-handle=5716 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1760 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --ya-custo-process --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=4900 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3540 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=6700 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4468 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=3404 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5152 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5556 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5260 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6764 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5368 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7064 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5424 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7112 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5312 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6204 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5476 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6776 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5548 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6840 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5592 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5496 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5680 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6728 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5732 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=5520 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5788 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6100 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5844 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6340 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
PID:5964 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6616 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
PID:6020 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6344 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
PID:6080 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6716 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
PID:5912 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --mojo-platform-channel-handle=6376 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
PID:6140 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6156 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7196 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7200 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
PID:416 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7208 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
PID:5320 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=7184 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵PID:5408
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6756 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5236 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=6748 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5216 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=8248 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵PID:5816
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --mojo-platform-channel-handle=3776 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:12⤵
- Checks computer location settings
PID:5284 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=3832 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵PID:1104
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Утилиты Windows" --mojo-platform-channel-handle=3500 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵PID:5024
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --mojo-platform-channel-handle=5000 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:12⤵
- Checks computer location settings
PID:1808 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=uwp_cookie_provider.mojom.UwpCookieProvider --lang=ru --service-sandbox-type=utility --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name=uwp_cookie_provider.mojom.UwpCookieProvider --mojo-platform-channel-handle=3784 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵PID:4996
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=3672 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵PID:5944
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Data Decoder Service" --mojo-platform-channel-handle=9952 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵PID:5980
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --mojo-platform-channel-handle=9844 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:12⤵
- Checks computer location settings
PID:6076 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=760 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵PID:5520
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=9384 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵PID:2028
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=2568 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵PID:2244
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=deep_links_provider.mojom.DeepLinksProvider --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="DeepLinks service" --mojo-platform-channel-handle=9868 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵PID:1756
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Импорт профилей" --mojo-platform-channel-handle=9924 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵PID:2272
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --display-capture-permissions-policy-allowed --enable-instaserp --disable-gpu-compositing --lang=ru --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=59 --mojo-platform-channel-handle=9912 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:12⤵
- Checks computer location settings
PID:6036 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=ru --service-sandbox-type=utility --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Распаковщик файлов" --mojo-platform-channel-handle=6028 --field-trial-handle=1944,i,5491048616563502590,4396177405657203658,131072 /prefetch:82⤵PID:6176
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x498 0x4281⤵
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater --bits_job_guid={4CD3B794-5C74-4CE1-B25A-9244D8092982}1⤵
- Enumerates system info in registry
PID:5956 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1668198794 --annotation=last_update_date=1668198794 --annotation=launches_after_update=1 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=5956 --annotation=metrics_client_id=20bbe7db2a164b0f99cf77586f64978e --annotation=micromode=broupdater --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.5.712 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x7291a3b0,0x7291a3c0,0x7291a3cc2⤵PID:5792
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=2112 --field-trial-handle=2032,i,16567447507419649368,17463091342844330117,131072 /prefetch:82⤵PID:1848
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1856 --field-trial-handle=2032,i,16567447507419649368,17463091342844330117,131072 /prefetch:22⤵PID:1624
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater-stat-bits --broupdater-stat-name=install --bits_job_guid={08A8E10D-0534-4477-9A39-2E7E6790048C}1⤵
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5344 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1668198794 --annotation=last_update_date=1668198794 --annotation=launches_after_update=2 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=5344 --annotation=metrics_client_id=20bbe7db2a164b0f99cf77586f64978e --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.5.712 --initial-client-data=0x180,0x184,0x188,0x15c,0x18c,0x7291a3b0,0x7291a3c0,0x7291a3cc2⤵PID:5604
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1804 --field-trial-handle=1968,i,13312748233937847375,13434767378415690597,131072 /prefetch:22⤵PID:5824
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=1828 --field-trial-handle=1968,i,13312748233937847375,13434767378415690597,131072 /prefetch:82⤵PID:5948
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater-stat-bits --broupdater-stat-name=dayuse --bits_job_guid={069D84F6-D5E3-438C-92C5-B311D8AC9E30}1⤵
- Enumerates system info in registry
PID:5320 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1668198794 --annotation=last_update_date=1668198794 --annotation=launches_after_update=3 --annotation=machine_id=f5ea51da667ecd6b5f2b9d06e4a3fc52 --annotation=main_process_pid=5320 --annotation=metrics_client_id=20bbe7db2a164b0f99cf77586f64978e --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=22.9.5.712 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x7291a3b0,0x7291a3c0,0x7291a3cc2⤵PID:5452
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1832 --field-trial-handle=2112,i,16917429725742480545,3074624381017613912,131072 /prefetch:22⤵PID:4352
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=26A083B3-D386-412F-BA5A-FFA6E708C2A4 --brand-id=yandex --process-name="Network Service" --mojo-platform-channel-handle=2028 --field-trial-handle=2112,i,16917429725742480545,3074624381017613912,131072 /prefetch:82⤵PID:2784
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffa000f46f8,0x7ffa000f4708,0x7ffa000f47182⤵PID:5316
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8268296373777331250,6684295734605973450,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:5456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,8268296373777331250,6684295734605973450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵PID:4756
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,8268296373777331250,6684295734605973450,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:2020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8268296373777331250,6684295734605973450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:5272
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8268296373777331250,6684295734605973450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3784 /prefetch:12⤵PID:3840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8268296373777331250,6684295734605973450,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3772 /prefetch:12⤵PID:4404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,8268296373777331250,6684295734605973450,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:5884
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,8268296373777331250,6684295734605973450,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5668 /prefetch:82⤵PID:3060
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8268296373777331250,6684295734605973450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:4448
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:2244 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x23c,0x240,0x244,0x1d8,0x248,0x7ff7d6815460,0x7ff7d6815470,0x7ff7d68154803⤵PID:4616
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8268296373777331250,6684295734605973450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:5880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8268296373777331250,6684295734605973450,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6360 /prefetch:12⤵PID:5584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4172
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exeFilesize
2.6MB
MD5cd0ca2fc38121fdab300560c8c88327a
SHA1f5ea49fb1f212c71613037c0dc2c06e88d3cf47e
SHA2564d5001f507b27913589639dd54590b9fa4d6ed749b3de5bcef0651bcbc0d43df
SHA512bb000c93a0474460c762b21b8100fa6a9a322354ddc7951cfdb52e53acc2e0645508bf800edf2faf8dc9fdd317e69db3ad24c780ab29bca2928aedf706450b1d
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exeFilesize
2.6MB
MD5cd0ca2fc38121fdab300560c8c88327a
SHA1f5ea49fb1f212c71613037c0dc2c06e88d3cf47e
SHA2564d5001f507b27913589639dd54590b9fa4d6ed749b3de5bcef0651bcbc0d43df
SHA512bb000c93a0474460c762b21b8100fa6a9a322354ddc7951cfdb52e53acc2e0645508bf800edf2faf8dc9fdd317e69db3ad24c780ab29bca2928aedf706450b1d
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exeFilesize
2.6MB
MD5cd0ca2fc38121fdab300560c8c88327a
SHA1f5ea49fb1f212c71613037c0dc2c06e88d3cf47e
SHA2564d5001f507b27913589639dd54590b9fa4d6ed749b3de5bcef0651bcbc0d43df
SHA512bb000c93a0474460c762b21b8100fa6a9a322354ddc7951cfdb52e53acc2e0645508bf800edf2faf8dc9fdd317e69db3ad24c780ab29bca2928aedf706450b1d
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exeFilesize
2.6MB
MD5cd0ca2fc38121fdab300560c8c88327a
SHA1f5ea49fb1f212c71613037c0dc2c06e88d3cf47e
SHA2564d5001f507b27913589639dd54590b9fa4d6ed749b3de5bcef0651bcbc0d43df
SHA512bb000c93a0474460c762b21b8100fa6a9a322354ddc7951cfdb52e53acc2e0645508bf800edf2faf8dc9fdd317e69db3ad24c780ab29bca2928aedf706450b1d
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exeFilesize
2.6MB
MD5cd0ca2fc38121fdab300560c8c88327a
SHA1f5ea49fb1f212c71613037c0dc2c06e88d3cf47e
SHA2564d5001f507b27913589639dd54590b9fa4d6ed749b3de5bcef0651bcbc0d43df
SHA512bb000c93a0474460c762b21b8100fa6a9a322354ddc7951cfdb52e53acc2e0645508bf800edf2faf8dc9fdd317e69db3ad24c780ab29bca2928aedf706450b1d
-
C:\Program Files (x86)\Yandex\YandexBrowser\22.9.5.712\service_update.exeFilesize
2.6MB
MD5cd0ca2fc38121fdab300560c8c88327a
SHA1f5ea49fb1f212c71613037c0dc2c06e88d3cf47e
SHA2564d5001f507b27913589639dd54590b9fa4d6ed749b3de5bcef0651bcbc0d43df
SHA512bb000c93a0474460c762b21b8100fa6a9a322354ddc7951cfdb52e53acc2e0645508bf800edf2faf8dc9fdd317e69db3ad24c780ab29bca2928aedf706450b1d
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
1KB
MD59f9f1a056d5ff8142b94110e790f736d
SHA116e149a2ab881984bca78b6cc0a5fa9b4e784b75
SHA2560ebaece3045def20575107d149307ec5cf0c2a62d8262661222de12d85cbe95c
SHA512f2108c26283e3ab85768623665a9e184cfaa583e6d5e105cb446351da5f4dca61b4f72598b963a1322f9e7d089822ae61148f1c7b28e752f9fddbba13aad0a5a
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
1KB
MD5e30fa779463f324c73bdbb94bbd36eed
SHA106c935c085d44482e09ee25d2b57c38dc96c7d5f
SHA256774ca053ff5e83bb0781fcede91c015432509706073fcb162a6c0efb26fe09a1
SHA51295bb836722933fa30f4bc7fe4d14d6d1963bac39cccc1b3db9499ae1d9f2af222713cead78fd032337ceeb80a257749175358071c44147255917666dd649080c
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
1KB
MD5e30fa779463f324c73bdbb94bbd36eed
SHA106c935c085d44482e09ee25d2b57c38dc96c7d5f
SHA256774ca053ff5e83bb0781fcede91c015432509706073fcb162a6c0efb26fe09a1
SHA51295bb836722933fa30f4bc7fe4d14d6d1963bac39cccc1b3db9499ae1d9f2af222713cead78fd032337ceeb80a257749175358071c44147255917666dd649080c
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
1KB
MD5e30fa779463f324c73bdbb94bbd36eed
SHA106c935c085d44482e09ee25d2b57c38dc96c7d5f
SHA256774ca053ff5e83bb0781fcede91c015432509706073fcb162a6c0efb26fe09a1
SHA51295bb836722933fa30f4bc7fe4d14d6d1963bac39cccc1b3db9499ae1d9f2af222713cead78fd032337ceeb80a257749175358071c44147255917666dd649080c
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
2KB
MD5a8bafae648ee8dfd0e477d92cfe761ba
SHA18a7c5c3c8e694b04670cbce26e2d1512fcd22a95
SHA25602a1322f1e5af8c4156971d2558413ac32a705c26d04564423793686cfb448cb
SHA51275f531f432e90ca091d6da7726773be279c9be281ae47fa2d9f8a967cadf8de74e46ce959a1c933366c964d38e7f953e41b4fd885cdc6fd7da75039ca715a733
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
4KB
MD521fb6a0fd290966f6a4dabc627a54809
SHA1a1ee3e64437e30f4e379feabedc85833defa3257
SHA2560ccf3bbfb9d415e8f04c5080ab1c4bba5d5eae15b846f46488caa1cbf035349c
SHA5124b6e3a1130e50856f06c9ac7ce9c101efdac3e17bca7a82e80cdfda3e2aa3460bbf8b993272ce1abad9f4d51137e92c6d89c89392c45478f0d77d1b86f885467
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
4KB
MD521fb6a0fd290966f6a4dabc627a54809
SHA1a1ee3e64437e30f4e379feabedc85833defa3257
SHA2560ccf3bbfb9d415e8f04c5080ab1c4bba5d5eae15b846f46488caa1cbf035349c
SHA5124b6e3a1130e50856f06c9ac7ce9c101efdac3e17bca7a82e80cdfda3e2aa3460bbf8b993272ce1abad9f4d51137e92c6d89c89392c45478f0d77d1b86f885467
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
4KB
MD521fb6a0fd290966f6a4dabc627a54809
SHA1a1ee3e64437e30f4e379feabedc85833defa3257
SHA2560ccf3bbfb9d415e8f04c5080ab1c4bba5d5eae15b846f46488caa1cbf035349c
SHA5124b6e3a1130e50856f06c9ac7ce9c101efdac3e17bca7a82e80cdfda3e2aa3460bbf8b993272ce1abad9f4d51137e92c6d89c89392c45478f0d77d1b86f885467
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
5KB
MD589d29afb99538830d9a6236ac7e4f32d
SHA180e6bab69f3f041032e5753ab41ac3e0ec85217f
SHA256cab57c1133ff123ca1dc7bd6f496af32eb987ef6a8a64969f47ba7f11370e097
SHA51297c05e90e9f8ed78b91ac10821f5384f70c7c94343ac82b4e61d79aaae58d8144efccb4a74d5e761290cbbc06401f9261ca0595157bb1de6a68c0258714d0536
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
7KB
MD501571f2dd89eaf430497ae0bcad69391
SHA19c1e0802ee83a1e147fa4f4fbf8474c0d821c952
SHA256c3075ace1d63f5bfdeec9fd4afe3b202b3fe8fb989662cccd675afbdb1f1841c
SHA51239374188abb9fa039fbc3d6b78a6172e83d34fc5f3931b6c436ad472b67436906e81509673f6e2ea0d2e6eabab3f7f396aa4ed675edd8849604747904aa93fcf
-
C:\ProgramData\Yandex\YandexBrowser\service_update.logFilesize
8KB
MD51c2ce3a3a52ff87e42d89ef2378cf6a9
SHA1598364722c21f785ef8d44f3c9eabea4f21f8551
SHA256077fc95f7ff1ab6c1472c8eef2960c13fb511a1726853e11d5e00e9b538a7aa3
SHA512d77fda09e9030bc7d5ce0644f10e8a70cacac0371b6017bed1e542964892108dd1fb9e6b6eec1d65bf72fea36c18de732e5fa5918c1b494cd539af5ade14e28d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
1KB
MD57200465878dd196f216d4177d304184d
SHA1c2257a556134049c8abb898694793bcc41a09ee9
SHA2564fe5021018313f6b1b238b26eef9cd3903e9ee53a20980721ccd6f80658013e2
SHA512e28370ac5dfc9bf0890b45044a5e0185c3e5c8e870afbe63104a8761e38b05b1fd661ebd2be7dd39b47b778bbb3ecfc7ed6c478e4f7436e7f21b0544c2f398ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_10F204F67590689C25A3C1C3FBC116B1Filesize
1KB
MD56147c7b5148ce98103cbf0bac13d39fc
SHA1309c57ec9dfb4601da52d4f30d13830fef78188d
SHA256b442dcc4451e3a32cb452c9227f430407014b6892724250c6e9796d21a61142a
SHA512d04abcefc7dc089563c8d401942acc66b7eb7cbf298b52af25b023daf749e3309e37a95e05632321d40e45dfe5e87e9d166f673663f19cd7a430d398adda70a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_EBD7B8AF3A6D56C51CDE1B85E8C855A8Filesize
1KB
MD5fe1a48194f793de2cb62df25dbb2be96
SHA135ba8161cc83d97efc87b152a9de68b0134f9832
SHA256bffe4d5299ff29e897d84c1d0770d6882ad623233da9c0237ab7ae91a83738cc
SHA512371b0a360d0beb858dcbf5891faff6419e6b330e74ece7cc15971f2b0968f432586cb9e045eb53e1426105799d8bfde69d2410c5255b521488c317e3915c8329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2Filesize
727B
MD5ab7888077621c2e80cc5246614668f10
SHA1ec8442d6ab0e420386ae951ae7d3cfee2caa1012
SHA2568d15eea6e933f3b9d4a4b58b3da9f28f7c06f3869c9a8198cfe3b1bb4fc9001c
SHA512f2e153ba54c4504c60d81f7e08475e1a6e9a4539444c9b42a321127b1988e3bdd90516e8810f7c664a74e565b5c9cf4ead92b7c93ca8d631ce40e831785010ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBFilesize
471B
MD5da5a9f149955d936a31dc5e456666aac
SHA1195238d41c1e13448f349f43bb295ef2d55cb47a
SHA25679ac574c7c45144bb35b59ff79c78dc59b66592715dea01b389e3620db663224
SHA51260d7d1f5405470ba1e6b80066af2e78240acbea8db58b5a03660874605178aebaa9ce342ca97f17798109e7411e82466db5af064e39eaddc05410f2abe672f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554EFilesize
1KB
MD54f7209e18b17f1c9682909c133636705
SHA1694d0ac3e890d1a8f98c3c00677148bf87549bed
SHA2562f08692e14c7927b0f0cd9e659ede49ccaf7f499e4eec32b371cf69d7b4f5558
SHA5121dd07a4ab7a901328a8486c62f54a60fa8cb77808660fcd78d003f4e252e819f51ca7e3d4726c5a791cee9cda18e997da917e91337985769991a492f9fe0dec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
1KB
MD5a2fc39c505462cf21afb0562c4a7900a
SHA12e5ca7899792f9bb867327446411fa4aa6d9636d
SHA2565e7a7cc7f989b93f9a93f8dafa06eb2641bea5fb9fe5aeb3ec90658356ada089
SHA512a417c8c0fcb3600b36e47823e3bab396ddbcba7c508fc940d14fe24f9c5997160b373101937cc733693bfcf90716a0ab2afefb8bb341b1f540b70827ce6d6cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BBFilesize
727B
MD5fa9d8b6cd98317157012fbadc87a86a0
SHA195b9de3eb73ff08f34c6d090361e5352af335255
SHA256996fe670b70f4dbec7febbc061119da89d92194bb903137743f7964f83ac1682
SHA51264a71d3957911a93c017b5e8869007667d6249e217a58ca693e4b04560c1de19dca080a669730c5bdf78ac0c1e67deda00e9ebba1ad3387c4d87c5fbf8baf11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
508B
MD5138b88b16c70e3207b1512fcec02a4d6
SHA16193cfae4b4b6de715f9dd866ded09f204991e31
SHA256322923a2a7eb89b2a5f69d31202b242266466cf0e3cd42657cfdea0660d30e95
SHA512d7689d1f1e7db0b51b8decee682f35916bad9569e20004186cdd1d9453e02331df560ce4327b39db5b1750b53f1395ea00455725ee703a77716be892e6819d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_10F204F67590689C25A3C1C3FBC116B1Filesize
536B
MD5b906cc2a07ea2b1852641580492f377c
SHA1973724251d7e94a289a8696520e55c6c5e58fb90
SHA256ae69c6f740d6d4765d85ed758579aac932a5fd6d8a3fa7d170f6077f50e8b96d
SHA512d34e0dcc26b3f79ce07127f39186988521c8cd473ef1b76f1b037e161e197e072badd10ded93e4b9f4ed75dd08c37e8434808e44693f76f321c8b60cf44b88a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_EBD7B8AF3A6D56C51CDE1B85E8C855A8Filesize
540B
MD58206271ff4658cf34ad0196a58e98093
SHA1427a91633bef9046a30bed88e5733e4386658344
SHA25614569962c5ef23bd2c11e7daacb2816f2b1b73ae553402373aefdb119926e20c
SHA512094ee1efdfa3082dceae17692d73b9a4abbc069f60d8deaf552fc07656176e20b44723e37f9bf9847cbbfd88c2bb0bc67275b3485d079763e62f5654dbc834aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3E3E9689537B6B136ECF210088069D55_A925FAB5FFC3CEDB8E62B2DCCBBBB4F2Filesize
434B
MD5d9358d4c5884f6f497fe917e8c9b1627
SHA17c26002e0891eef0f66036a19018ab50833066f0
SHA25635f942139761d9d86e95101e8339cccabd4fb8c0c9705383c89a4d16cdbfeedf
SHA512bba8166889519390547e91c214bfab171af751479a08f97daa1b3d94e33b5a6f1fd933bdd801fa272fa3b4439c48a18cc30728467af1c7584bfb6ed0cd49eb9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBFilesize
430B
MD526258f4fafcbd666e0d356246193953e
SHA104bc41aa42685efa7b040c2ca14900464c016216
SHA2568d98a36d262a805d0164aac713c9937c4377ee9d3ca3b7d74b21e8fb66a49943
SHA512b81e304f57c28d81b8c1696d931984a0b58db74d21ace2a4b62a5ca751fa70db3aed6f38f2c50d6873ff90e5656dcc3d17e32825f909fa84cade9e5be1a5ed66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554EFilesize
536B
MD58cbbedad77165c943bfa929063c19f24
SHA1a9dee2a5b380407b249c045dc295432e177335ff
SHA256e85896063ec4ada727c3e92c1eccaa442f4c1ed1b0512237f8d4e19e5c0da4bc
SHA512c2b6ea1ae136dcdca7663d413a1b538204de3b2cff63b951572d1f22ad01fef5baba7cec39a5c907976bb8deb9c1e3b7290c36e0cb3d88a88ee98a4453f3301c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554EFilesize
536B
MD58cbbedad77165c943bfa929063c19f24
SHA1a9dee2a5b380407b249c045dc295432e177335ff
SHA256e85896063ec4ada727c3e92c1eccaa442f4c1ed1b0512237f8d4e19e5c0da4bc
SHA512c2b6ea1ae136dcdca7663d413a1b538204de3b2cff63b951572d1f22ad01fef5baba7cec39a5c907976bb8deb9c1e3b7290c36e0cb3d88a88ee98a4453f3301c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
506B
MD5682a733cba64db3fc82d3256e1aba9eb
SHA1dd3160ca6dfdb9e1727dc33be520aad566bde08a
SHA256d42d7ff46adafced60c8c23a559b46fe9381664fb5c69d9e1056dc7a685d0d4c
SHA51202178fd1c430d71a57084a5cb48edcab6fbe5150bebad3b1cc2dd480a097d14fb70372f7774ae55241cbea311d3e1d1d6b2ae42be04f13b7bfa2d383e1fd6c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BBFilesize
442B
MD5b8221d4b9ad68ebe7fa6d0e5407bdfd3
SHA148ea90ee70a30c374e87de8320b1e6979dcff613
SHA256ffd16f0291d61d6f7001d4c05507d92d79ed703431d398dd1760c2d6b007d8c6
SHA5126787a12919f9a8b23161b047eb26bb00eab40193f166be8b2f91ddcb18fa23f619ab8e34840aa428e5f20095a08b384606fbc4d87fd7b8d679aad53fd511dd5f
-
C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\BRAND_COMMONFilesize
23.3MB
MD5704b9e56754deca9d8cab59ac416a5e3
SHA153bc4648a7f7814f427a61f008d134acec760d33
SHA2565f80c7a26858ccd008a834ed04871c9032f4723a8d83349b000942467f6c0342
SHA512ac54dbb212ef720820c2cc5388066e936c10f29d3090b7cb6fa43480e2aed796d7a6f9180682fcf236ae25d4a361600f377966e5a9461f20cd5aec97c79ce0a2
-
C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\BROWSER.PACKED.7ZFilesize
90.9MB
MD53ad7309946977c3f43a59773b89dad06
SHA157d1dd503684071e12814094feb0d11ada7edf39
SHA2566fa1128a06a132a85ddaa3ac347c4810bffc73579448fef846f1f5ecd8833d5a
SHA512d6c60dc22976dc788932081c2fc4d7db2a820b38d7d13a05162acc3f2f9b81617fca762cdb84ba2b491bfe615b53fff56eb79a48b54c6c65665dd876d96f87e2
-
C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\brand_yandexFilesize
2.1MB
MD5c6e892b2169cbcd078ff55ce415872db
SHA17b57f5a96c9744630548ee3ea3d35ebb3a8ab2fd
SHA2568a922259be1b2c13bfeb626da78113c4913b52ec7795f13da3eba85ad85b8998
SHA5121cd11b3833be359702c17453165a959f3a82f005cf39a4c26d306c3073706b868c103794bf3ef5eac5b14e2f7de078e872033989336f4104da5ca178b57808f9
-
C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\setup.exeFilesize
3.9MB
MD592f18837910719b7d57737f22add2728
SHA156a980f693447b2e9d89b27e7173dfd900e644fb
SHA256715a9352ab4a0338ccfd854349a1fd025b4c9c5572b367e1e5898662f2a9c402
SHA512c7e5e6112d21f3be16f1fce5e65cc26b80ebed056d3d895429736c89e0e0552310611220a89e6652aee759d5307362d438037969248fca97a47bcfba0d073a4c
-
C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\setup.exeFilesize
3.9MB
MD592f18837910719b7d57737f22add2728
SHA156a980f693447b2e9d89b27e7173dfd900e644fb
SHA256715a9352ab4a0338ccfd854349a1fd025b4c9c5572b367e1e5898662f2a9c402
SHA512c7e5e6112d21f3be16f1fce5e65cc26b80ebed056d3d895429736c89e0e0552310611220a89e6652aee759d5307362d438037969248fca97a47bcfba0d073a4c
-
C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\setup.exeFilesize
3.9MB
MD592f18837910719b7d57737f22add2728
SHA156a980f693447b2e9d89b27e7173dfd900e644fb
SHA256715a9352ab4a0338ccfd854349a1fd025b4c9c5572b367e1e5898662f2a9c402
SHA512c7e5e6112d21f3be16f1fce5e65cc26b80ebed056d3d895429736c89e0e0552310611220a89e6652aee759d5307362d438037969248fca97a47bcfba0d073a4c
-
C:\Users\Admin\AppData\Local\Temp\YB_C9F05.tmp\setup.exeFilesize
3.9MB
MD592f18837910719b7d57737f22add2728
SHA156a980f693447b2e9d89b27e7173dfd900e644fb
SHA256715a9352ab4a0338ccfd854349a1fd025b4c9c5572b367e1e5898662f2a9c402
SHA512c7e5e6112d21f3be16f1fce5e65cc26b80ebed056d3d895429736c89e0e0552310611220a89e6652aee759d5307362d438037969248fca97a47bcfba0d073a4c
-
C:\Users\Admin\AppData\Local\Temp\clids.xmlFilesize
599B
MD5dae47d5fb36af27a9869750c11f52494
SHA1366629747a061c7bd6a6883f5364734cecfc697a
SHA25637ec2fcea5119863c67d94c2d269ec242e294cb76c9674e793d7280b6fd13c90
SHA5126937d3a2f3c4ecd3544a473a79808f1932e036cbafe6bff11d51f5d131fd8b6e594dbdfb254f96f49177cac5517e536bc14d855beaf3c81349ddbf7324bf79b4
-
C:\Users\Admin\AppData\Local\Temp\distrib_infoFilesize
317B
MD5e92c8760fd5e433923bd03a375d1798c
SHA1933e331d87291c7fcd942b717ee456095aaaefe8
SHA2569ab9819802e815694c19c8f1eae8481f593367a7eae8a5ea760cd194e50efa70
SHA5128455a6b31a0c36c77b9a09d1d1aa4ab2db1f35284e75b92f56a2788fdf4f1129118913ecf29b6bc64bf7530318f30a90402255b14195e9be9a45a5160cbcc00d
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
13KB
MD594527bbeecf928d9e5c36e22da29edc5
SHA124c3924bc4831c71715beb6e7e019b1f25a1a278
SHA25626e1a03fb16cd3c9fab8c484cbc899787e26db9ce4ba6b811477582d3dcda0f3
SHA512a02c297b8cf33072ea84719cc9fa0b9084883d5d991901df9907aa1e59c42a4d2821156cb680e2585248fde7a8ff3e2563c252729595e726c709b2eb23d91b7f
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
13KB
MD55162e3a0a7d3e3b497d1dbe13c83c0b9
SHA129ed47bc103a7d3ca2787f65886f9db5976d0d46
SHA25616ea521496d6d0a6e1e0ac3704e1013657c11d00d625facc613f095a5634a25a
SHA51224f23fb27ca4520383e9e1d7d6a9522f512ee5ee92e6b39aef6897637f75ebd1958ccb076f4ddb7fdca3c47ea6893641e93db44860fee11093dd85e6d4950a75
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
24KB
MD54ac00cc3f4fbc9c7a08c8fe74a2eec2f
SHA12917454143bf70cd98ce63e88ba6e6aa4afa94ab
SHA2566e7eca83854bf6bd6a780e6d9ecb2e5c5aad5ffa59eed5d4dbcdfa1b5775d058
SHA5123fb67682d807715572d576cfb508e70e0e10bfedb5bb9d60e11eafeb68c993102266ba85c470167dac019f7143a41ff5396e7f81d33c4d2e161b7d1dd5f41371
-
C:\Users\Admin\AppData\Local\Temp\lite_installer.logFilesize
24KB
MD53ba30b51cfd5d29c89fe5cfdd209487e
SHA1e8a8b5d15ab15e3874bc5b514516b6b3d27286ed
SHA256c5aa2cd0f8840501a30a085a617406da2b298bf54a2171cfd8ca4593a254cb41
SHA5128bbf34dd5bdeeb262a1ae9a32bebd5027c695ff2dc99a42cd7460efa3dba9233a531e3a36426119ff896afebd5019c3c4099c1fac86b59468df268625542ec54
-
C:\Users\Admin\AppData\Local\Temp\master_preferencesFilesize
127KB
MD5232e2fee6736a853bbf982db72320aac
SHA1e705a9a4e4bbc8d5ed7d1ceead3ff6619968134c
SHA25626f16f2c7364a56893f561dcca807d72e914c2f2346c12f28f1b42f9ea586e48
SHA5129495de901c7a8f1b4c6e93cc0f29ec906166067c8685d9593dd2b37dc1d33c1f11bbdcdd5794025d270337a700a52985142803204f3e842296193c1c0fb4f096
-
C:\Users\Admin\AppData\Local\Temp\master_preferencesFilesize
127KB
MD5232e2fee6736a853bbf982db72320aac
SHA1e705a9a4e4bbc8d5ed7d1ceead3ff6619968134c
SHA25626f16f2c7364a56893f561dcca807d72e914c2f2346c12f28f1b42f9ea586e48
SHA5129495de901c7a8f1b4c6e93cc0f29ec906166067c8685d9593dd2b37dc1d33c1f11bbdcdd5794025d270337a700a52985142803204f3e842296193c1c0fb4f096
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2104_1008626121\explorer.exeFilesize
3.9MB
MD592f18837910719b7d57737f22add2728
SHA156a980f693447b2e9d89b27e7173dfd900e644fb
SHA256715a9352ab4a0338ccfd854349a1fd025b4c9c5572b367e1e5898662f2a9c402
SHA512c7e5e6112d21f3be16f1fce5e65cc26b80ebed056d3d895429736c89e0e0552310611220a89e6652aee759d5307362d438037969248fca97a47bcfba0d073a4c
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2104_1008626121\explorer.exeFilesize
3.9MB
MD592f18837910719b7d57737f22add2728
SHA156a980f693447b2e9d89b27e7173dfd900e644fb
SHA256715a9352ab4a0338ccfd854349a1fd025b4c9c5572b367e1e5898662f2a9c402
SHA512c7e5e6112d21f3be16f1fce5e65cc26b80ebed056d3d895429736c89e0e0552310611220a89e6652aee759d5307362d438037969248fca97a47bcfba0d073a4c
-
C:\Users\Admin\AppData\Local\Temp\website.icoMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\yandex_browser_installer.logFilesize
4KB
MD51b05382c539f895cdaa1a7e4c502faff
SHA1c586777949b22be84266c5e3e7df08d1c59e399d
SHA256dce3339f1030fdb5bfd346fa173816a3e91a115f4eb3943d72f811969a3fdec9
SHA512041346436b3924c538b5346885705f220aa640cfe7a469c6cbb86d610e4b71a03b86a5fdaca9c43dfa49501e0e13fae57ff60f01d47f597e7b209200a01b9f4e
-
C:\Users\Admin\AppData\Local\Temp\yandex_browser_installer.logFilesize
22KB
MD59f25aeee32e1c6886abd04752876de27
SHA1ac3edf405137daefa14e6db984d74941d908cb10
SHA256ab39342cee0fc02e5d402ac9f508adc44aab6d76d073ac7e7ee2f176656a75ba
SHA512276952bd1a832ca145f879ba682bfe4eb3c07b5fc3d9f56c6f2075819e5bed01e2d54e0091809bb289f88b0cae0e6010d09104b2e73a83b587b030b5d7c04610
-
C:\Users\Admin\AppData\Local\Temp\ybB933.tmpFilesize
149.9MB
MD59390950e98a038d0afb2e38a37205215
SHA151eb49b4674abfd303e117d11e30e35b1f35613b
SHA25634c5e497922d035702216a66e209b6fc77f12b0a57e2248bd3bd7ce152f6b579
SHA5128ff1e3499f1b34928c029d02b10bbc45cf8e959acd0bf65260a30bb461f0a78ba0af0070233768e257fed61e31ba665ba9eb50af4f88e6b74e68efb8eeb22951
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeFilesize
592KB
MD58259eb04a6ff623568b1a49e912c26a4
SHA1b4113803d77e97b90a7eb6787a1b62465cb90481
SHA2562b70b880b2a34f6dea6f7b4d0fdc27f048869566fa4a1d844cc7c2df07201e2f
SHA5125ede9ed74a7c4c1a00ae4e987517a94be0a54d4501f56df49d773dd0ab77ca2ad949f301ee339b22f6b73613fcd9b61cac4a79c8ed005cf2b3991a02b62a32f3
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeFilesize
592KB
MD58259eb04a6ff623568b1a49e912c26a4
SHA1b4113803d77e97b90a7eb6787a1b62465cb90481
SHA2562b70b880b2a34f6dea6f7b4d0fdc27f048869566fa4a1d844cc7c2df07201e2f
SHA5125ede9ed74a7c4c1a00ae4e987517a94be0a54d4501f56df49d773dd0ab77ca2ad949f301ee339b22f6b73613fcd9b61cac4a79c8ed005cf2b3991a02b62a32f3
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeFilesize
3.8MB
MD5fc4d8246330acc949c2cd0a98f48c65e
SHA10ebeffc7ecd70a9d59b42a7ef31af20e238f9e83
SHA256d22475235e8ca73d8717eae98a2c865cc2d9ec5f4908ad9f41394ad8e636abc0
SHA512c244656e3d20543c4ea65c79fbbcc2e46c7d827d8a6e4e210199767c20004fa553993a1eb69a0e4cbe529ded399c22ac58aabb678abc6b7891fd1a7a9f71533f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad\settings.datFilesize
48B
MD5608af808d4b82f6b155f5e955182e14a
SHA1f0ae12c593eafb45c85f37d57e7229e09b55c412
SHA25697b1828896180d79f6117796a08c6b7cc8a0cb4d23a91497d6224f19f3f88260
SHA51235941a5f6f3c25d00d78becd15014c5d355035d800cd3b5904163f325f3984ef998e8feea1c7921e494986ba74c82421be98fc6e63ee38a13e7deed5188d61a4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yandex.lnkFilesize
2KB
MD56d1833f5b873d60c62d47c993e60c135
SHA1b8e36d9b9e49e5d4f3de9415a1d1ec20ef550f6f
SHA256457ed0d22edfa9e65a77930d669f9905d3dd96493c979e84d3a2c0a822ff66bf
SHA512e4e204d3bf8a5e51832fe60edb193dea133a774909fa8689f7049d84b639c4d9169ff8eb5756b1ddf1c5298c980526fea34a1562cdc5be82332ad0f61448a946
-
C:\Users\Admin\AppData\Roaming\Yandex\uiFilesize
38B
MD51d506174788c1a2d7c00a6cc40b5168d
SHA10350a967853eb57a85a4bbd657af4e2655385113
SHA256da3ed0d4571c833d5e0a27ba81d88b5863ab2ff0b159177529f03be41443b09c
SHA512f6532a3c5654efaf4d72cfb0c315c449b08f32838544c1e31ff0221d4c41bb6c12b93aca7b2bd4cab598de40ced27543ab73af696b7239a18fa9c3f75c8829a9
-
C:\Windows\TEMP\sdwra_2104_419317634\service_update.exeFilesize
2.6MB
MD5cd0ca2fc38121fdab300560c8c88327a
SHA1f5ea49fb1f212c71613037c0dc2c06e88d3cf47e
SHA2564d5001f507b27913589639dd54590b9fa4d6ed749b3de5bcef0651bcbc0d43df
SHA512bb000c93a0474460c762b21b8100fa6a9a322354ddc7951cfdb52e53acc2e0645508bf800edf2faf8dc9fdd317e69db3ad24c780ab29bca2928aedf706450b1d
-
C:\Windows\Temp\sdwra_2104_419317634\service_update.exeFilesize
2.6MB
MD5cd0ca2fc38121fdab300560c8c88327a
SHA1f5ea49fb1f212c71613037c0dc2c06e88d3cf47e
SHA2564d5001f507b27913589639dd54590b9fa4d6ed749b3de5bcef0651bcbc0d43df
SHA512bb000c93a0474460c762b21b8100fa6a9a322354ddc7951cfdb52e53acc2e0645508bf800edf2faf8dc9fdd317e69db3ad24c780ab29bca2928aedf706450b1d
-
memory/244-213-0x0000000000000000-mapping.dmp
-
memory/244-245-0x0000000000000000-mapping.dmp
-
memory/416-381-0x0000000000000000-mapping.dmp
-
memory/472-259-0x0000000000000000-mapping.dmp
-
memory/1296-233-0x0000000000000000-mapping.dmp
-
memory/1608-251-0x0000000000000000-mapping.dmp
-
memory/1612-220-0x0000000000000000-mapping.dmp
-
memory/1652-174-0x0000000000000000-mapping.dmp
-
memory/1760-268-0x0000000000000000-mapping.dmp
-
memory/1848-183-0x0000000000000000-mapping.dmp
-
memory/1860-231-0x0000000000000000-mapping.dmp
-
memory/1984-178-0x0000000000000000-mapping.dmp
-
memory/2084-199-0x0000000000000000-mapping.dmp
-
memory/2104-144-0x0000000000000000-mapping.dmp
-
memory/2256-216-0x0000000000000000-mapping.dmp
-
memory/2272-242-0x0000000000000000-mapping.dmp
-
memory/2388-148-0x0000000000000000-mapping.dmp
-
memory/2476-214-0x0000000000000000-mapping.dmp
-
memory/2724-193-0x0000000000000000-mapping.dmp
-
memory/2832-138-0x0000000000000000-mapping.dmp
-
memory/2844-210-0x0000000000000000-mapping.dmp
-
memory/3104-140-0x0000000000000000-mapping.dmp
-
memory/3540-273-0x0000000000000000-mapping.dmp
-
memory/3684-211-0x0000000000000000-mapping.dmp
-
memory/3704-261-0x0000000000000000-mapping.dmp
-
memory/3776-217-0x0000000000000000-mapping.dmp
-
memory/3832-239-0x0000000000000000-mapping.dmp
-
memory/3900-228-0x0000000000000000-mapping.dmp
-
memory/3940-375-0x0000000000000000-mapping.dmp
-
memory/3944-370-0x0000000000000000-mapping.dmp
-
memory/3972-206-0x0000000000000000-mapping.dmp
-
memory/3980-196-0x0000000000000000-mapping.dmp
-
memory/4012-224-0x0000000000000000-mapping.dmp
-
memory/4056-186-0x0000000000000000-mapping.dmp
-
memory/4088-229-0x0000000000000000-mapping.dmp
-
memory/4104-171-0x0000000000000000-mapping.dmp
-
memory/4380-209-0x0000000000000000-mapping.dmp
-
memory/4468-277-0x0000000000000000-mapping.dmp
-
memory/4696-223-0x0000000000000000-mapping.dmp
-
memory/4768-212-0x0000000000000000-mapping.dmp
-
memory/4924-263-0x0000000000000000-mapping.dmp
-
memory/4968-132-0x0000000000000000-mapping.dmp
-
memory/5112-226-0x0000000000000000-mapping.dmp
-
memory/5152-279-0x0000000000000000-mapping.dmp
-
memory/5216-284-0x0000000000000000-mapping.dmp
-
memory/5236-287-0x0000000000000000-mapping.dmp
-
memory/5260-291-0x0000000000000000-mapping.dmp
-
memory/5312-296-0x0000000000000000-mapping.dmp
-
memory/5320-387-0x0000000000000000-mapping.dmp
-
memory/5368-301-0x0000000000000000-mapping.dmp
-
memory/5408-390-0x0000000000000000-mapping.dmp
-
memory/5424-305-0x0000000000000000-mapping.dmp
-
memory/5476-310-0x0000000000000000-mapping.dmp
-
memory/5548-315-0x0000000000000000-mapping.dmp
-
memory/5592-320-0x0000000000000000-mapping.dmp
-
memory/5680-325-0x0000000000000000-mapping.dmp
-
memory/5732-330-0x0000000000000000-mapping.dmp
-
memory/5788-334-0x0000000000000000-mapping.dmp
-
memory/5844-340-0x0000000000000000-mapping.dmp
-
memory/5912-345-0x0000000000000000-mapping.dmp
-
memory/5964-349-0x0000000000000000-mapping.dmp
-
memory/6020-355-0x0000000000000000-mapping.dmp
-
memory/6080-361-0x0000000000000000-mapping.dmp
-
memory/6140-365-0x0000000000000000-mapping.dmp