File name:

install.exe

Full analysis: https://app.any.run/tasks/f839ad6c-7a13-43af-bc42-0db33e1c9877
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: February 05, 2025, 11:20:36
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
arch-scr
arch-html
stealer
adware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

73846BBBECEAA0E6F5B940424DC3BDEA

SHA1:

6E7943999ABA88A1338F03949E3DDF9DCD14E77E

SHA256:

49FD011C4A24D452E96B600179622D64228F12C049BC2FC90355BDE951C99776

SSDEEP:

6144:BTM6qtgn0I+4i5tucngwZXp+V44zPOfBOLzh:BdTcscgwQ44zWZwh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • lite_installer.exe (PID: 6828)
      • seederexe.exe (PID: 6980)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • install.exe (PID: 6276)
    • Reads security settings of Internet Explorer

      • install.exe (PID: 6276)
      • lite_installer.exe (PID: 6828)
    • Executable content was dropped or overwritten

      • install.exe (PID: 6276)
    • Checks Windows Trust Settings

      • install.exe (PID: 6276)
      • msiexec.exe (PID: 6572)
    • Starts a Microsoft application from unusual location

      • YandexPackSetup.exe (PID: 6512)
    • Application launched itself

      • install.exe (PID: 6276)
    • Potential Corporate Privacy Violation

      • install.exe (PID: 6276)
      • lite_installer.exe (PID: 6828)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 6572)
    • Reads Mozilla Firefox installation path

      • seederexe.exe (PID: 6980)
    • Process requests binary or script from the Internet

      • lite_installer.exe (PID: 6828)
  • INFO

    • Checks supported languages

      • install.exe (PID: 6276)
      • YandexPackSetup.exe (PID: 6512)
      • install.exe (PID: 6520)
      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 6720)
      • lite_installer.exe (PID: 6828)
      • seederexe.exe (PID: 6980)
    • The sample compiled with russian language support

      • install.exe (PID: 6276)
      • msiexec.exe (PID: 6720)
    • Create files in a temporary directory

      • install.exe (PID: 6276)
      • install.exe (PID: 6520)
      • msiexec.exe (PID: 6720)
      • lite_installer.exe (PID: 6828)
      • seederexe.exe (PID: 6980)
    • Reads the computer name

      • install.exe (PID: 6276)
      • YandexPackSetup.exe (PID: 6512)
      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 6720)
      • lite_installer.exe (PID: 6828)
      • seederexe.exe (PID: 6980)
      • install.exe (PID: 6520)
    • Checks proxy server information

      • install.exe (PID: 6276)
      • lite_installer.exe (PID: 6828)
    • Creates files or folders in the user directory

      • install.exe (PID: 6276)
      • seederexe.exe (PID: 6980)
      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 6720)
    • The sample compiled with english language support

      • install.exe (PID: 6276)
    • Reads the machine GUID from the registry

      • install.exe (PID: 6276)
      • msiexec.exe (PID: 6572)
      • seederexe.exe (PID: 6980)
    • Reads the software policy settings

      • install.exe (PID: 6276)
      • msiexec.exe (PID: 6572)
    • Process checks computer location settings

      • install.exe (PID: 6276)
      • msiexec.exe (PID: 6720)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 6720)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:05:19 13:34:48+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 143360
InitializedDataSize: 84992
UninitializedDataSize: -
EntryPoint: 0x74a6
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.1.0.33
ProductVersionNumber: 0.1.0.33
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Russian
CharacterSet: Unicode
FileDescription: Setup Downloader
FileVersion: 0.1.0.33
InternalName: download
LegalCopyright: Copyright (C) 2015 Yandex LLC
OriginalFileName: downloader.exe
ProductName: Setup Downloader
ProductVersion: 0.1.0.33
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
7
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start install.exe yandexpacksetup.exe install.exe msiexec.exe msiexec.exe lite_installer.exe seederexe.exe

Process information

PID
CMD
Path
Indicators
Parent process
6276"C:\Users\admin\AppData\Local\Temp\install.exe" C:\Users\admin\AppData\Local\Temp\install.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup Downloader
Exit code:
0
Version:
0.1.0.33
Modules
Images
c:\users\admin\appdata\local\temp\install.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6512"C:\Users\admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe" /passive /msicl "VID=849 YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y "C:\Users\admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe
install.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Software Installer
Exit code:
0
Version:
3.0.5419.0
Modules
Images
c:\users\admin\appdata\local\temp\7f4987fb1a6e43d69e3e94b29eb75926\yandexpacksetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6520C:\Users\admin\AppData\Local\Temp\install.exe --stat dwnldr/p=635487/cnt=0/dt=4/ct=0/rt=0 --dh 2420 --st 1738754447C:\Users\admin\AppData\Local\Temp\install.exe
install.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup Downloader
Exit code:
0
Version:
0.1.0.33
Modules
Images
c:\users\admin\appdata\local\temp\install.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6572C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6720C:\Windows\syswow64\MsiExec.exe -Embedding 22DD5C1AC2E9AA7C7B37DB7D74560D02C:\Windows\SysWOW64\msiexec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6828"C:\Users\admin\AppData\Local\Temp\164059CA-4D86-4433-9971-400295D3C1DD\lite_installer.exe" --use-user-default-locale --silent --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --YABROWSERC:\Users\admin\AppData\Local\Temp\164059CA-4D86-4433-9971-400295D3C1DD\lite_installer.exe
msiexec.exe
User:
admin
Company:
Yandex
Integrity Level:
MEDIUM
Description:
YandexBrowserDownloader
Version:
1.0.1.9
Modules
Images
c:\users\admin\appdata\local\temp\164059ca-4d86-4433-9971-400295d3c1dd\lite_installer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
6980"C:\Users\admin\AppData\Local\Temp\2D397F6B-E5ED-4929-AA91-83092552452F\seederexe.exe" "--yqs=y" "--yhp=y" "--ilight=" "--oem=" "--nopin=n" "--pin_custom=n" "--pin_desktop=n" "--pin_taskbar=y" "--locale=us" "--browser=y" "--browser_default=" "--loglevel=trace" "--ess=" "--clids=C:\Users\admin\AppData\Local\Temp\clids-yasearch.xml" "--sender=C:\Users\admin\AppData\Local\Temp\95C9C4AD-6770-44E3-BB0D-E8BA609FE720\sender.exe" "--is_elevated=no" "--ui_level=3" "--good_token=x" "--no_opera=n"C:\Users\admin\AppData\Local\Temp\2D397F6B-E5ED-4929-AA91-83092552452F\seederexe.exe
msiexec.exe
User:
admin
Company:
Yandex
Integrity Level:
MEDIUM
Description:
Browser Integration Module
Version:
3.7.12.0
Modules
Images
c:\users\admin\appdata\local\temp\2d397f6b-e5ed-4929-aa91-83092552452f\seederexe.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\shlwapi.dll
c:\windows\syswow64\msvcrt.dll
Total events
9 329
Read events
9 303
Write events
17
Delete events
9

Modification events

(PID) Process:(6276) install.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6276) install.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6276) install.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6572) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
AC190000ECDBC101C077DB01
(PID) Process:(6572) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
C61502A3F7F74AD3097A6CCCB5D025D5DFB1C840AB1837565981330C75ECAE73
(PID) Process:(6572) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(6980) seederexe.exeKey:HKEY_CURRENT_USER\SOFTWARE\AppDataLow\Yandex
Operation:writeName:UICreated_admin
Value:
1
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\E2F7BA5F3A11DF34592646F9E7939D30
Operation:writeName:E0E469B53A9B6724E99DD4A5750247A7
Value:
C:\Users\admin\AppData\Local\Yandex\YaPin\Yandex.exe
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
Operation:writeName:C:\Users\admin\AppData\Local\Yandex\YaPin\
Value:
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
Operation:writeName:C:\Users\admin\AppData\Local\Yandex\
Value:
Executable files
16
Suspicious files
30
Text files
74
Unknown types
0

Dropped files

PID
Process
Filename
Type
6512YandexPackSetup.exeC:\Users\admin\AppData\Local\Temp\{5B964E0E-B9A3-4276-9ED9-4D5A5720747A}\YandexSearch.msi
MD5:
SHA256:
6572msiexec.exeC:\Windows\Installer\137051.msi
MD5:
SHA256:
6276install.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554Ebinary
MD5:3374ABAF3482D45A9D9E263FF48CC341
SHA256:FBCBC602CB303D9E5769E9B029597DDDADD3BB6A82200AEB1259212E90475792
6276install.exeC:\Users\admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\seed.txttext
MD5:4E0D67E54AD6626E957D15B08AE128A6
SHA256:479F16C2905BAE7BB62EDF5164063FC0260820E701F1FFA18F768F88AA899201
6276install.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554Ebinary
MD5:39394122BB44C590E009FB02BB4A8C0F
SHA256:556E565F6AE74621248286A200211D364873E672F46276E4BCED4A6CA8D85E18
6720msiexec.exeC:\Users\admin\AppData\Roaming\Yandex\clids-yabrowser.xmlxml
MD5:B25449D117B17C3D1BED6CC29D614274
SHA256:291C27AF9AFE3A3A6D1EB3117E1342FC79380787F6A8D70DE21D260F13CEF753
6276install.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\YandexPackSetup[1].exeexecutable
MD5:DE5CC8B280F3A924E2C3F269FE7618A0
SHA256:167398F1384B8322E60810EAA3CF147E2884580063CB12E19DAB484F63A4BBD6
6572msiexec.exeC:\Windows\Installer\MSI7235.tmpexecutable
MD5:0C80A997D37D930E7317D6DAC8BB7AE1
SHA256:A5DD2F97C6787C335B7807FF9B6966877E9DD811F9E26326837A7D2BD224DE86
6276install.exeC:\Users\admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exeexecutable
MD5:DE5CC8B280F3A924E2C3F269FE7618A0
SHA256:167398F1384B8322E60810EAA3CF147E2884580063CB12E19DAB484F63A4BBD6
6720msiexec.exeC:\Users\admin\AppData\Local\Temp\164059CA-4D86-4433-9971-400295D3C1DD\lite_installer.exeexecutable
MD5:AAFDFAA7A989DDB216510FC9AE5B877F
SHA256:688D0B782437CCFAE2944281ADE651A2DA063F222E80B3510789DBDCE8B00FDC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
33
TCP/UDP connections
104
DNS requests
78
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
104.18.21.226:80
http://ocsp.globalsign.com/rootr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHUeP1PjGFkz6V8I7O6tApc%3D
unknown
whitelisted
GET
200
93.158.134.14:80
http://clck.yandex.ru/click/dtype=stred/pid=198/cid=73002/path=1.run_dist/ui=%7Bde9904be-b93a-4d2c-a9d8-3bc93ef196e8%7D/clid1=9183405-849/dt=32654815/ds=9196976/bits=7_8_19041_3636/bver=24_12_4_1051/prod_version=1_0_1_9/result=ok/*
unknown
whitelisted
GET
200
104.18.21.226:80
http://ocsp.globalsign.com/rootr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCDQHuXxad%2F5c1K2Rl1mo%3D
unknown
whitelisted
GET
200
23.48.23.145:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.145:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.145:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
23.48.23.145:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
92.123.104.14:443
www.bing.com
Akamai International B.V.
DE
whitelisted
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
1176
svchost.exe
20.190.160.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
6276
install.exe
5.45.205.241:80
downloader.yandex.net
YANDEX LLC
RU
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 23.48.23.145
  • 23.48.23.166
  • 23.48.23.164
  • 23.48.23.177
  • 23.48.23.180
  • 23.48.23.173
  • 23.48.23.156
  • 23.48.23.194
  • 23.48.23.193
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
www.bing.com
  • 92.123.104.14
  • 92.123.104.8
  • 92.123.104.67
  • 92.123.104.5
  • 92.123.104.11
  • 92.123.104.9
  • 92.123.104.6
  • 92.123.104.10
  • 92.123.104.13
  • 2.21.65.134
  • 2.21.65.137
  • 2.21.65.146
  • 2.21.65.132
  • 2.21.65.157
  • 2.21.65.153
  • 2.21.65.154
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
login.live.com
  • 20.190.160.3
  • 20.190.160.14
  • 40.126.32.76
  • 20.190.160.4
  • 20.190.160.66
  • 20.190.160.64
  • 20.190.160.17
  • 20.190.160.130
whitelisted
downloader.yandex.net
  • 5.45.205.241
  • 5.45.205.245
  • 5.45.205.242
  • 5.45.205.244
  • 5.45.205.243
whitelisted
cachev2-fra-02.cdn.yandex.net
  • 5.45.200.105
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
ocsp.globalsign.com
  • 104.18.21.226
  • 104.18.20.226
whitelisted

Threats

PID
Process
Class
Message
6276
install.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
6276
install.exe
Misc activity
ET INFO Packed Executable Download
6828
lite_installer.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
6828
lite_installer.exe
Misc activity
ET INFO EXE - Served Attached HTTP
Process
Message
YandexPackSetup.exe
IsMSISrvFree() In
YandexPackSetup.exe
IsMSISrvFree() Out ret = 1
YandexPackSetup.exe
IsMSISrvFree() : OpenMutex() err ret = 2
YandexPackSetup.exe
IsAlreadyRun() In
YandexPackSetup.exe
IsAlreadyRun() Out : ret (BOOL) = 0
YandexPackSetup.exe
GetSidFromEnumSess(): LsaEnumerateLogonSessions() lpszSid = S-1-5-21-1693682860-607145093-2874071422-1001
YandexPackSetup.exe
GetSidFromEnumSess(): ProfileImagePath(1) = C:\Users\admin
YandexPackSetup.exe
GetLoggedCreds_WTSSessionInfo(): szUserName = admin, szDomain = DESKTOP-JGLLJLD, dwSessionId = 1
YandexPackSetup.exe
GetSidFromEnumSess(): LsaGetLogonSessionData(0) err = 5
YandexPackSetup.exe
GetLoggedCreds_WTSSessionInfo(): szUserName = admin, szDomain = DESKTOP-JGLLJLD, dwSessionId = 1