Resubmissions

26-01-2025 13:59

250126-rakvfstjas 10

26-01-2025 13:58

250126-q91jhssrgz 10

Analysis

  • max time kernel
    424s
  • max time network
    426s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-01-2025 13:59

General

  • Target

    Revision.1.14.exe

  • Size

    10.4MB

  • MD5

    e25e39744775a8a636866cc7bc446640

  • SHA1

    9258197f2960a19f6412861fcdee2eb65ea33704

  • SHA256

    d28b5ac49d1df2d04f5c918c3584772efea9260ee514cf0062ea7936ffbc1195

  • SHA512

    b567e820813c78dc7a0864b557cdb8ff9846915fb1d2e6a3c3ddf031a77c4a2b376d6973b35b117ff97a00e690fed432bfbb236da526c824247ab331f6870c86

  • SSDEEP

    196608:WMz28dVl/fzCdDNU/9onJ5hrZEK3e9tGPqKM48RmU/qZlsPv4TbqM/xBfmxMoK5j:km9c5hlEK/PNMtNqZW43rDoK5BN

Malware Config

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Signatures

  • Bdaejec

    Bdaejec is a backdoor written in C++.

  • Bdaejec family
  • Detects Bdaejec Backdoor. 1 IoCs

    Bdaejec is backdoor written in C++.

  • Possible privilege escalation attempt 8 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 25 IoCs
  • Loads dropped DLL 9 IoCs
  • Modifies file permissions 1 TTPs 8 IoCs
  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 26 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs .reg file with regedit 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Revision.1.14.exe
    "C:\Users\Admin\AppData\Local\Temp\Revision.1.14.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Users\Admin\AppData\Local\Temp\Revision.1.14.exe
      "C:\Users\Admin\AppData\Local\Temp\Revision.1.14.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c for /d %e in ("%USERPROFILE%\AppData\Local\Temp\_MEI*")do cd "%e" && copy subinacl.exe "C:\Windows\System32"
        3⤵
        • Drops file in System32 directory
        PID:2008
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c for /d %a in ("%USERPROFILE%\AppData\Local\Temp\_MEI*")do @takeown/f "%a"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3852
        • C:\Windows\system32\takeown.exe
          takeown /f "C:\Users\Admin\AppData\Local\Temp\_MEI23042"
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:1496
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c for /d %b in ("%USERPROFILE%\AppData\Local\Temp\_MEI*")do @icacls "%b" /grant Users:F
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3772
        • C:\Windows\system32\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\Temp\_MEI23042" /grant Users:F
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:1336
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /setowner=Administrator /grant=Administrator=f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1560
        • C:\Windows\system32\subinacl.exe
          SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /setowner=Administrator /grant=Administrator=f
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3516
          • C:\Users\Admin\AppData\Local\Temp\wxl.exe
            C:\Users\Admin\AppData\Local\Temp\wxl.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            PID:1460
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\018d0348.bat" "
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1332
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /grant=System=f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3488
        • C:\Windows\system32\subinacl.exe
          SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /grant=System=f
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1760
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /grant=Everyone=f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4812
        • C:\Windows\system32\subinacl.exe
          SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /grant=Everyone=f
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3448
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /grant=Users=f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3416
        • C:\Windows\system32\subinacl.exe
          SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /grant=Users=f
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1100
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /grant=Administrators=f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3024
        • C:\Windows\system32\subinacl.exe
          SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /grant=Administrators=f
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4860
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /grant="NETWORK SERVICE"=f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4424
        • C:\Windows\system32\subinacl.exe
          SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /grant="NETWORK SERVICE"=f
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4752
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /grant=INTERACTIVE=f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Windows\system32\subinacl.exe
          SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs /grant=INTERACTIVE=f
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3540
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /setowner=Administrator /grant=Administrator=f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4244
        • C:\Windows\system32\subinacl.exe
          SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /setowner=Administrator /grant=Administrator=f
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1608
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /grant=System=f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3972
        • C:\Windows\system32\subinacl.exe
          SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /grant=System=f
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1356
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /grant=Everyone=f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\system32\subinacl.exe
          SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /grant=Everyone=f
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1028
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /grant=Users=f
        3⤵
          PID:2260
          • C:\Windows\system32\subinacl.exe
            SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /grant=Users=f
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5048
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /grant=Administrators=f
          3⤵
            PID:3368
            • C:\Windows\system32\subinacl.exe
              SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /grant=Administrators=f
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:632
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /grant="NETWORK SERVICE"=f
            3⤵
              PID:5020
              • C:\Windows\system32\subinacl.exe
                SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /grant="NETWORK SERVICE"=f
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1768
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /grant=INTERACTIVE=f
              3⤵
                PID:2000
                • C:\Windows\system32\subinacl.exe
                  SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters /grant=INTERACTIVE=f
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:3964
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC /setowner=Administrator /grant=Administrator=f
                3⤵
                  PID:3652
                  • C:\Windows\system32\subinacl.exe
                    SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC /setowner=Administrator /grant=Administrator=f
                    4⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:1304
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC /grant=System=f
                  3⤵
                    PID:4040
                    • C:\Windows\system32\subinacl.exe
                      SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC /grant=System=f
                      4⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:4976
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC /grant=Everyone=f
                    3⤵
                      PID:752
                      • C:\Windows\system32\subinacl.exe
                        SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC /grant=Everyone=f
                        4⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:1600
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC /grant=Users=f
                      3⤵
                        PID:1224
                        • C:\Windows\system32\subinacl.exe
                          SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC /grant=Users=f
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:2756
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC /grant=Administrators=f
                        3⤵
                          PID:1668
                          • C:\Windows\system32\subinacl.exe
                            SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC /grant=Administrators=f
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:1684
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC\Parameters /setowner=Administrator /grant=Administrator=f
                          3⤵
                            PID:4036
                            • C:\Windows\system32\subinacl.exe
                              SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC\Parameters /setowner=Administrator /grant=Administrator=f
                              4⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:4252
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC\Parameters /grant=System=f
                            3⤵
                              PID:956
                              • C:\Windows\system32\subinacl.exe
                                SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC\Parameters /grant=System=f
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:1336
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC\Parameters /grant=Everyone=f
                              3⤵
                                PID:1664
                                • C:\Windows\system32\subinacl.exe
                                  SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC\Parameters /grant=Everyone=f
                                  4⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:4400
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC\Parameters /grant=Administrators=f
                                3⤵
                                  PID:1560
                                  • C:\Windows\system32\subinacl.exe
                                    SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC\Parameters /grant=Administrators=f
                                    4⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:3120
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC\Parameters /grant=Users=f
                                  3⤵
                                    PID:644
                                    • C:\Windows\system32\subinacl.exe
                                      SUBINACL /keyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ClipSVC\Parameters /grant=Users=f
                                      4⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:2340
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c CD %USERPROFILE%\AppData\Local\Temp\_MEI*\ && regedit /S "RpUnByp.reg"
                                    3⤵
                                      PID:2416
                                      • C:\Windows\regedit.exe
                                        regedit /S "RpUnByp.reg"
                                        4⤵
                                        • Runs .reg file with regedit
                                        PID:768
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c CD %USERPROFILE%\AppData\Local\Temp\_MEI*\ && regedit /S "ClipUnByp.reg"
                                      3⤵
                                        PID:4044
                                        • C:\Windows\regedit.exe
                                          regedit /S "ClipUnByp.reg"
                                          4⤵
                                          • Server Software Component: Terminal Services DLL
                                          • Sets service image path in registry
                                          • Runs .reg file with regedit
                                          PID:2116
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c takeown /f "C:\Windows\System32\RuntimeBroker.exe"
                                        3⤵
                                          PID:5068
                                          • C:\Windows\system32\takeown.exe
                                            takeown /f "C:\Windows\System32\RuntimeBroker.exe"
                                            4⤵
                                            • Possible privilege escalation attempt
                                            • Modifies file permissions
                                            PID:5036
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c icacls "C:\Windows\System32\RuntimeBroker.exe" /grant Users:F
                                          3⤵
                                            PID:1564
                                            • C:\Windows\system32\icacls.exe
                                              icacls "C:\Windows\System32\RuntimeBroker.exe" /grant Users:F
                                              4⤵
                                              • Possible privilege escalation attempt
                                              • Modifies file permissions
                                              PID:4980
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c takeown /f "C:\Windows\System32\ClipSVC.dll"
                                            3⤵
                                              PID:4644
                                              • C:\Windows\system32\takeown.exe
                                                takeown /f "C:\Windows\System32\ClipSVC.dll"
                                                4⤵
                                                • Possible privilege escalation attempt
                                                • Modifies file permissions
                                                PID:3000
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c icacls "C:\Windows\System32\ClipSVC.dll" /grant Users:F
                                              3⤵
                                                PID:2720
                                                • C:\Windows\system32\icacls.exe
                                                  icacls "C:\Windows\System32\ClipSVC.dll" /grant Users:F
                                                  4⤵
                                                  • Possible privilege escalation attempt
                                                  • Modifies file permissions
                                                  PID:4440
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c takeown /f "C:\Windows\System32\rpcss.dll"
                                                3⤵
                                                  PID:4448
                                                  • C:\Windows\system32\takeown.exe
                                                    takeown /f "C:\Windows\System32\rpcss.dll"
                                                    4⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    PID:3296
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c icacls "C:\Windows\System32\rpcss.dll" /grant Users:F
                                                  3⤵
                                                    PID:3776
                                                    • C:\Windows\system32\icacls.exe
                                                      icacls "C:\Windows\System32\rpcss.dll" /grant Users:F
                                                      4⤵
                                                      • Possible privilege escalation attempt
                                                      • Modifies file permissions
                                                      PID:3664
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c rename C:\Windows\System32\RuntimeBroker.exes RuntimeBroker.exe
                                                    3⤵
                                                      PID:1136
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c rename C:\Windows\System32\ClipSVC.dlla ClipSVC.dll
                                                      3⤵
                                                        PID:1648
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c rename C:\Windows\System32\rpcss.dlla rpcss.dll
                                                        3⤵
                                                          PID:3076
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c sc start ClipSVC
                                                          3⤵
                                                            PID:400
                                                            • C:\Windows\system32\sc.exe
                                                              sc start ClipSVC
                                                              4⤵
                                                              • Launches sc.exe
                                                              PID:596
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c sc start RpcSs
                                                            3⤵
                                                              PID:5032
                                                              • C:\Windows\system32\sc.exe
                                                                sc start RpcSs
                                                                4⤵
                                                                • Launches sc.exe
                                                                PID:1844

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\ClipByp.reg

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          9680b8de4eb0d205207e55d08dcf1c7e

                                                          SHA1

                                                          e94092ac15c139963c3cfc56821315f911c7a061

                                                          SHA256

                                                          b47d517375294ff137927e7c7479bad5d7bcd2508268137b15a88a77626119ad

                                                          SHA512

                                                          8c91e2b020be5e9dc9a06fbe04f0d2c2c0e9dfab34ce3d80ce3c122aa6168aa30a1539279b9d4001c50bce8f26b55874b32cbfe3e7dc28070a310872677e490f

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\VCRUNTIME140.dll

                                                          Filesize

                                                          85KB

                                                          MD5

                                                          89a24c66e7a522f1e0016b1d0b4316dc

                                                          SHA1

                                                          5340dd64cfe26e3d5f68f7ed344c4fd96fbd0d42

                                                          SHA256

                                                          3096cafb6a21b6d28cf4fe2dd85814f599412c0fe1ef090dd08d1c03affe9ab6

                                                          SHA512

                                                          e88e0459744a950829cd508a93e2ef0061293ab32facd9d8951686cbe271b34460efd159fd8ec4aa96ff8a629741006458b166e5cff21f35d049ad059bc56a1a

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\_bz2.pyd

                                                          Filesize

                                                          92KB

                                                          MD5

                                                          cf77513525fc652bad6c7f85e192e94b

                                                          SHA1

                                                          23ec3bb9cdc356500ec192cac16906864d5e9a81

                                                          SHA256

                                                          8bce02e8d44003c5301608b1722f7e26aada2a03d731fa92a48c124db40e2e41

                                                          SHA512

                                                          dbc1ba8794ce2d027145c78b7e1fc842ffbabb090abf9c29044657bdecd44396014b4f7c2b896de18aad6cfa113a4841a9ca567e501a6247832b205fe39584a9

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\_ctypes.pyd

                                                          Filesize

                                                          129KB

                                                          MD5

                                                          5e869eebb6169ce66225eb6725d5be4a

                                                          SHA1

                                                          747887da0d7ab152e1d54608c430e78192d5a788

                                                          SHA256

                                                          430f1886caf059f05cde6eb2e8d96feb25982749a151231e471e4b8d7f54f173

                                                          SHA512

                                                          feb6888bb61e271b1670317435ee8653dedd559263788fbf9a7766bc952defd7a43e7c3d9f539673c262abedd97b0c4dd707f0f5339b1c1570db4e25da804a16

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\_lzma.pyd

                                                          Filesize

                                                          172KB

                                                          MD5

                                                          5fbb728a3b3abbdd830033586183a206

                                                          SHA1

                                                          066fde2fa80485c4f22e0552a4d433584d672a54

                                                          SHA256

                                                          f9bc6036d9e4d57d08848418367743fb608434c04434ab07da9dabe4725f9a9b

                                                          SHA512

                                                          31e7c9fe9d8680378f8e3ea4473461ba830df2d80a3e24e5d02a106128d048430e5d5558c0b99ec51c3d1892c76e4baa14d63d1ec1fc6b1728858aa2a255b2fb

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\_tkinter.pyd

                                                          Filesize

                                                          68KB

                                                          MD5

                                                          09f66528018ffef916899845d6632307

                                                          SHA1

                                                          cf9ddad46180ef05a306dcb05fdb6f24912a69ce

                                                          SHA256

                                                          34d89fe378fc10351d127fb85427449f31595eccf9f5d17760b36709dd1449b9

                                                          SHA512

                                                          ed406792d8a533db71bd71859edbb2c69a828937757afec1a83fd1eacb1e5e6ec9afe3aa5e796fa1f518578f6d64ff19d64f64c9601760b7600a383efe82b3de

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\base_library.zip

                                                          Filesize

                                                          766KB

                                                          MD5

                                                          ef89045e36cee8f8f9f61f4420c7cba9

                                                          SHA1

                                                          87021966e96e276e03693ae18b2aebffba40707b

                                                          SHA256

                                                          6b4dd4c78fc1b22fb66cce2f97dbadfd729a9c0bc49109bc3066eacd2d7accb8

                                                          SHA512

                                                          db2b36c0449b826e354f1d20b02df41738e77ec5857159926795c131736f4502a7ec9d71d7812ebe92395d99a289e5d33343a5393650b12b38822abcf98e9735

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\python37.dll

                                                          Filesize

                                                          3.6MB

                                                          MD5

                                                          c4709f84e6cf6e082b80c80b87abe551

                                                          SHA1

                                                          c0c55b229722f7f2010d34e26857df640182f796

                                                          SHA256

                                                          ca8e39f2b1d277b0a24a43b5b8eada5baf2de97488f7ef2484014df6e270b3f3

                                                          SHA512

                                                          e04a5832b9f2e1e53ba096e011367d46e6710389967fa7014a0e2d4a6ce6fc8d09d0ce20cee7e7d67d5057d37854eddab48bef7df1767f2ec3a4ab91475b7ce4

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\subinacl.exe

                                                          Filesize

                                                          300KB

                                                          MD5

                                                          0519dccaeee93a521d718d5b8926ae18

                                                          SHA1

                                                          4b2a13b097bb7f1b66fd3d44014cd9c3f8ad5cda

                                                          SHA256

                                                          556664b9dffcb3cd0dbf1ce448a53461e50f4d22a2d69cd5a915d340058488a3

                                                          SHA512

                                                          f4b3fdcbd16e862748d0d407df99b24bb648f66911ee5705ab5731c6ad2ecafce8d31eb894e1fd691bc22c02951b311589032169ffd6a42449112ae02015aa18

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tcl86t.dll

                                                          Filesize

                                                          1.6MB

                                                          MD5

                                                          c0b23815701dbae2a359cb8adb9ae730

                                                          SHA1

                                                          5be6736b645ed12e97b9462b77e5a43482673d90

                                                          SHA256

                                                          f650d6bc321bcda3fc3ac3dec3ac4e473fb0b7b68b6c948581bcfc54653e6768

                                                          SHA512

                                                          ed60384e95be8ea5930994db8527168f78573f8a277f8d21c089f0018cd3b9906da764ed6fcc1bd4efad009557645e206fbb4e5baef9ab4b2e3c8bb5c3b5d725

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tcl\auto.tcl

                                                          Filesize

                                                          20KB

                                                          MD5

                                                          5e9b3e874f8fbeaadef3a004a1b291b5

                                                          SHA1

                                                          b356286005efb4a3a46a1fdd53e4fcdc406569d0

                                                          SHA256

                                                          f385515658832feb75ee4dce5bd53f7f67f2629077b7d049b86a730a49bd0840

                                                          SHA512

                                                          482c555a0da2e635fa6838a40377eef547746b2907f53d77e9ffce8063c1a24322d8faa3421fc8d12fdcaff831b517a65dafb1cea6f5ea010bdc18a441b38790

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tcl\encoding\cp1252.enc

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          5900f51fd8b5ff75e65594eb7dd50533

                                                          SHA1

                                                          2e21300e0bc8a847d0423671b08d3c65761ee172

                                                          SHA256

                                                          14df3ae30e81e7620be6bbb7a9e42083af1ae04d94cf1203565f8a3c0542ace0

                                                          SHA512

                                                          ea0455ff4cd5c0d4afb5e79b671565c2aede2857d534e1371f0c10c299c74cb4ad113d56025f58b8ae9e88e2862f0864a4836fed236f5730360b2223fde479dc

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tcl\http1.0\pkgIndex.tcl

                                                          Filesize

                                                          735B

                                                          MD5

                                                          10ec7cd64ca949099c818646b6fae31c

                                                          SHA1

                                                          6001a58a0701dff225e2510a4aaee6489a537657

                                                          SHA256

                                                          420c4b3088c9dacd21bc348011cac61d7cb283b9bee78ae72eed764ab094651c

                                                          SHA512

                                                          34a0acb689e430ed2903d8a903d531a3d734cb37733ef13c5d243cb9f59c020a3856aad98726e10ad7f4d67619a3af1018f6c3e53a6e073e39bd31d088efd4af

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tcl\init.tcl

                                                          Filesize

                                                          23KB

                                                          MD5

                                                          b900811a252be90c693e5e7ae365869d

                                                          SHA1

                                                          345752c46f7e8e67dadef7f6fd514bed4b708fc5

                                                          SHA256

                                                          bc492b19308bc011cfcd321f1e6e65e6239d4eeb620cc02f7e9bf89002511d4a

                                                          SHA512

                                                          36b8cdba61b9222f65b055c0c513801f3278a3851912215658bcf0ce10f80197c1f12a5ca3054d8604da005ce08da8dcd303b8544706b642140a49c4377dd6ce

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tcl\opt0.4\pkgIndex.tcl

                                                          Filesize

                                                          607B

                                                          MD5

                                                          92ff1e42cfc5fecce95068fc38d995b3

                                                          SHA1

                                                          b2e71842f14d5422a9093115d52f19bcca1bf881

                                                          SHA256

                                                          eb9925a8f0fcc7c2a1113968ab0537180e10c9187b139c8371adf821c7b56718

                                                          SHA512

                                                          608d436395d055c5449a53208f3869b8793df267b8476ad31bcdd9659a222797814832720c495d938e34bf7d253ffc3f01a73cc0399c0dfb9c85d2789c7f11c0

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tcl\package.tcl

                                                          Filesize

                                                          22KB

                                                          MD5

                                                          55e2db5dcf8d49f8cd5b7d64fea640c7

                                                          SHA1

                                                          8fdc28822b0cc08fa3569a14a8c96edca03bfbbd

                                                          SHA256

                                                          47b6af117199b1511f6103ec966a58e2fd41f0aba775c44692b2069f6ed10bad

                                                          SHA512

                                                          824c210106de7eae57a480e3f6e3a5c8fb8ac4bbf0a0a386d576d3eb2a3ac849bdfe638428184056da9e81767e2b63eff8e18068a1cf5149c9f8a018f817d3e5

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tcl\tclIndex

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          e127196e9174b429cc09c040158f6aab

                                                          SHA1

                                                          ff850f5d1bd8efc1a8cb765fe8221330f0c6c699

                                                          SHA256

                                                          abf7d9d1e86de931096c21820bfa4fd70db1f55005d2db4aa674d86200867806

                                                          SHA512

                                                          c4b98ebc65e25df41e6b9a93e16e608cf309fa0ae712578ee4974d84f7f33bcf2a6ed7626e88a343350e13da0c5c1a88e24a87fcbd44f7da5983bb3ef036a162

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tcl\tm.tcl

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          f9ed2096eea0f998c6701db8309f95a6

                                                          SHA1

                                                          bcdb4f7e3db3e2d78d25ed4e9231297465b45db8

                                                          SHA256

                                                          6437bd7040206d3f2db734fa482b6e79c68bcc950fba80c544c7f390ba158f9b

                                                          SHA512

                                                          e4fb8f28dc72ea913f79cedf5776788a0310608236d6607adc441e7f3036d589fd2b31c446c187ef5827fd37dcaa26d9e94d802513e3bf3300e94dd939695b30

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tinyaes.cp37-win_amd64.pyd

                                                          Filesize

                                                          39KB

                                                          MD5

                                                          035050d80ecd470fae12439fa37ae048

                                                          SHA1

                                                          52776ab4d123e261ec1f7dd21f9899e9acad36b7

                                                          SHA256

                                                          ff9918e95a8d8d0681bb838810bf358a94ba77985795cb7b4637be4c924a2ca7

                                                          SHA512

                                                          188e37700ae484613c9b139ce72ae5798df7a8754af4f27825afe3ac8afdbd50d45901ce58e2844fb5ddc4db9d49b1bde7c9d4be5bbbc548f3e2e77cdf5aaf3d

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk86t.dll

                                                          Filesize

                                                          1.4MB

                                                          MD5

                                                          fdc8a5d96f9576bd70aa1cadc2f21748

                                                          SHA1

                                                          bae145525a18ce7e5bc69c5f43c6044de7b6e004

                                                          SHA256

                                                          1a6d0871be2fa7153de22be008a20a5257b721657e6d4b24da8b1f940345d0d5

                                                          SHA512

                                                          816ada61c1fd941d10e6bb4350baa77f520e2476058249b269802be826bab294a9c18edc5d590f5ed6f8dafed502ab7ffb29db2f44292cb5bedf2f5fa609f49c

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\button.tcl

                                                          Filesize

                                                          20KB

                                                          MD5

                                                          309ab5b70f664648774453bccbe5d3ce

                                                          SHA1

                                                          51bf685dedd21de3786fe97bc674ab85f34bd061

                                                          SHA256

                                                          0d95949cfacf0df135a851f7330acc9480b965dac7361151ac67a6c667c6276d

                                                          SHA512

                                                          d5139752bd7175747a5c912761916efb63b3c193dd133ad25d020a28883a1dea6b04310b751f5fcbe579f392a8f5f18ae556116283b3e137b4ea11a2c536ec6b

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\entry.tcl

                                                          Filesize

                                                          16KB

                                                          MD5

                                                          be28d16510ee78ecc048b2446ee9a11a

                                                          SHA1

                                                          4829d6e8ab8a283209fb4738134b03b7bd768bad

                                                          SHA256

                                                          8f57a23c5190b50fad00bdee9430a615ebebfc47843e702374ae21beb2ad8b06

                                                          SHA512

                                                          f56af7020531249bc26d88b977baffc612b6566146730a681a798ff40be9ebc04d7f80729bafe0b9d4fac5b0582b76f9530f3fe376d42a738c9bc4b3b442df1f

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\icons.tcl

                                                          Filesize

                                                          10KB

                                                          MD5

                                                          2652aad862e8fe06a4eedfb521e42b75

                                                          SHA1

                                                          ed22459ad3d192ab05a01a25af07247b89dc6440

                                                          SHA256

                                                          a78388d68600331d06bb14a4289bc1a46295f48cec31ceff5ae783846ea4d161

                                                          SHA512

                                                          6ecfbb8d136444a5c0dbbce2d8a4206f1558bdd95f111d3587b095904769ac10782a9ea125d85033ad6532edf3190e86e255ac0c0c81dc314e02d95cca86b596

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\listbox.tcl

                                                          Filesize

                                                          14KB

                                                          MD5

                                                          c33963d3a512f2e728f722e584c21552

                                                          SHA1

                                                          75499cfa62f2da316915fada2580122dc3318bad

                                                          SHA256

                                                          39721233855e97bfa508959b6dd91e1924456e381d36fdfc845e589d82b1b0cc

                                                          SHA512

                                                          ea01d8cb36d446ace31c5d7e50dfae575576fd69fd5d413941eebba7ccc1075f6774af3c69469cd7baf6e1068aa5e5b4c560f550edd2a8679124e48c55c8e8d7

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\menu.tcl

                                                          Filesize

                                                          37KB

                                                          MD5

                                                          181ed74919f081eeb34269500e228470

                                                          SHA1

                                                          953eb429f6d98562468327858ed0967bdc21b5ad

                                                          SHA256

                                                          564ac0040176cc5744e3860abc36b5ffbc648da20b26a710dc3414eae487299b

                                                          SHA512

                                                          220e496b464575115baf1dede838e70d5ddd6d199b5b8acc1763e66d66801021b2d7cd0e1e1846868782116ad8a1f127682073d6eacd7e73f91bced89f620109

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\panedwindow.tcl

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          2da0a23cc9d6fd970fe00915ea39d8a2

                                                          SHA1

                                                          dfe3dc663c19e9a50526a513043d2393869d8f90

                                                          SHA256

                                                          4adf738b17691489c71c4b9d9a64b12961ada8667b81856f7adbc61dffeadf29

                                                          SHA512

                                                          b458f3d391df9522d4e7eae8640af308b4209ce0d64fd490bfc0177fde970192295c1ea7229ce36d14fc3e582c7649460b8b7b0214e0ff5629b2b430a99307d4

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\pkgIndex.tcl

                                                          Filesize

                                                          363B

                                                          MD5

                                                          a6448af2c8fafc9a4f42eaca6bf6ab2e

                                                          SHA1

                                                          0b295b46b6df906e89f40a907022068bc6219302

                                                          SHA256

                                                          cd44ee7f76c37c0c522bd0cfca41c38cdeddc74392b2191a3af1a63d9d18888e

                                                          SHA512

                                                          5b1a8ca5b09b7281de55460d21d5195c4ee086bebdc35fa561001181490669ffc67d261f99eaa900467fe97e980eb733c5ffbf9d8c541ede18992bf4a435c749

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\scale.tcl

                                                          Filesize

                                                          7KB

                                                          MD5

                                                          1ce32cdaeb04c75bfceea5fb94b8a9f0

                                                          SHA1

                                                          cc7614c9eade999963ee78b422157b7b0739894c

                                                          SHA256

                                                          58c662dd3d2c653786b05aa2c88831f4e971b9105e4869d866fb6186e83ed365

                                                          SHA512

                                                          1ee5a187615ae32f17936931b30fea9551f9e3022c1f45a2bca81624404f4e68022fcf0b03fbd61820ec6958983a8f2fbfc3ad2ec158433f8e8de9b8fcf48476

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\scrlbar.tcl

                                                          Filesize

                                                          12KB

                                                          MD5

                                                          4cbffc4e6b3f56a5890e3f7c31c6c378

                                                          SHA1

                                                          75db5205b311f55d1ca1d863b8688a628bf6012a

                                                          SHA256

                                                          6ba3e2d62bd4856d7d7ae87709fcaa23d81efc38c375c6c5d91639555a84c35d

                                                          SHA512

                                                          65df7ae09e06c200a8456748dc89095bb8417253e01ec4fdafb28a84483147ddc77aaf6b49be9e18a326a94972086a99044bee3ce5cf8026337dfc6972c92c04

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\spinbox.tcl

                                                          Filesize

                                                          15KB

                                                          MD5

                                                          9971530f110ac2fb7d7ec91789ea2364

                                                          SHA1

                                                          ab553213c092ef077524ed56fc37da29404c79a7

                                                          SHA256

                                                          5d6e939b44f630a29c4fcb1e2503690c453118607ff301bef3c07fa980d5075a

                                                          SHA512

                                                          81b4cec39b03fbeca59781aa54960f0a10a09733634f401d5553e1aaa3ebf12a110c9d555946fcdd70a9cc897514663840745241ad741dc440bb081a12dcf411

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\text.tcl

                                                          Filesize

                                                          32KB

                                                          MD5

                                                          03cc27e28e0cfce1b003c3e936797ab0

                                                          SHA1

                                                          c7fe5ae7f35c86ec3724f6a111eaaf2c1a18abe9

                                                          SHA256

                                                          bccc1039f0eb331c4bb6bd5848051bb745f242016952723478c93b009f63d254

                                                          SHA512

                                                          5091b10ee8446e6853ef7060ec13ab8cada0d6448f9081febd07546c061f69fc273bbf23ba7af05d8359e618dd68a5c27f0453480fe3f26e744db19bfcd115c7

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\tk.tcl

                                                          Filesize

                                                          22KB

                                                          MD5

                                                          3250ec5b2efe5bbe4d3ec271f94e5359

                                                          SHA1

                                                          6a0fe910041c8df4f3cdc19871813792e8cc4e4c

                                                          SHA256

                                                          e1067a0668debb2d8e8ec3b7bc1aec3723627649832b20333f9369f28e4dfdbf

                                                          SHA512

                                                          f8e403f3d59d44333bce2aa7917e6d8115bec0fe5ae9a1306f215018b05056467643b7aa228154ddced176072bc903dfb556cb2638f5c55c1285c376079e8fe3

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\altTheme.tcl

                                                          Filesize

                                                          3KB

                                                          MD5

                                                          8ff9d357af3806d997bb8654e95f530c

                                                          SHA1

                                                          62292163299cc229031bb4eafbe900323056561a

                                                          SHA256

                                                          e36864b33d7c2b47fe26646377be86fb341bbf2b6df13e33bd799e87d24fc193

                                                          SHA512

                                                          ecdc47e7d1f0f9c0c052aca2eb2de10e78b2256e8db85d7b52f365c1074a4e24cdb1c7a2780b36dfa36f174ff87b6a31c49f61cc0ac3d2412b3915234d911c9c

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\button.tcl

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          ea7cf40852afd55ffda9db29a0e11322

                                                          SHA1

                                                          b7b42fac93e250b54eb76d95048ac3132b10e6d8

                                                          SHA256

                                                          391b6e333d16497c4b538a7bdb5b16ef11359b6e3b508d470c6e3703488e3b4d

                                                          SHA512

                                                          123d78d6ac34af4833d05814220757dccf2a9af4761fe67a8fe5f67a0d258b3c8d86ed346176ffb936ab3717cfd75b4fab7373f7853d44fa356be6e3a75e51b9

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\clamTheme.tcl

                                                          Filesize

                                                          4KB

                                                          MD5

                                                          aa2987dc061daa998b73a1ad937ee4bb

                                                          SHA1

                                                          33fe9dfa76fb08b9d8d5c3554d13482d330c2db1

                                                          SHA256

                                                          4ed0acdd29fc1fb45c6bdc9efb2cbade34b93c45d5dbb269a4a4a3044cf4cb7a

                                                          SHA512

                                                          5a83b1fc88e42bb1dad60d89cd5f2193e6ab59c4902a6c727e0090d1f395c2f122521fdff250a14109ee5113d5034319199fb260129416ea962559350f217a03

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\classicTheme.tcl

                                                          Filesize

                                                          3KB

                                                          MD5

                                                          7dbf35f3f0f9fb68626019ff94efbcd3

                                                          SHA1

                                                          213f18224bf0573744836cd3bedc83d5e443a406

                                                          SHA256

                                                          30e6766e9b8292793395324e412b0f5a8888512b84b080e247f95bf6efb11a9d

                                                          SHA512

                                                          9081e5c89ecde8337c5a52531def24924c0bcb3a1f0596d3b986cc59e635f67a78327abf26209bf71a9ba370a93174298e6abd11586382d7d70adea7e5ccf854

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\combobox.tcl

                                                          Filesize

                                                          12KB

                                                          MD5

                                                          fbcaa6a08d9830114248f91e10d4c918

                                                          SHA1

                                                          fa63c94824bebd3531086816650d3f3fa73fe434

                                                          SHA256

                                                          9d80aa9701e82862467684d3dff1a9ec5bbc2bbba4f4f070518bbde7e38499bb

                                                          SHA512

                                                          b377c31cc9137851679cba0560efe4265792d1576bd781dd42c22014a7a8f3d10d9d48a1154bb88a2987197594c8b728b71fa689ce1b32928f8513796a6a0aa3

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\cursors.tcl

                                                          Filesize

                                                          3KB

                                                          MD5

                                                          74596004dfdbf2ecf6af9c851156415d

                                                          SHA1

                                                          933318c992b705bf9f8511621b4458ecb8772788

                                                          SHA256

                                                          7bdffa1c2692c5d1cf67b518f9acb32fa4b4d9936ed076f4db835943bc1a00d6

                                                          SHA512

                                                          0d600b21db67bf9dadbdd49559573078efb41e473e94124ac4d2551bc10ec764846dc1f7674daa79f8d2a8aeb4ca27a5e11c2f30ede47e3ecee77d60d7842262

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\defaults.tcl

                                                          Filesize

                                                          4KB

                                                          MD5

                                                          0e03292f7678540cb4f3440859863b0c

                                                          SHA1

                                                          909849894b02f2c213bde0fbced8c1378eb9b81e

                                                          SHA256

                                                          304ff31fc82f6086c93aaa594d83d8da25866ce1c2af1208f9e7585d74ca9a51

                                                          SHA512

                                                          87e5d2484e5e7e3c00b319219028b012576b7d73b84a9a13ed15551c9431bf216c0b96376ae5a7070b5a391d9887e55abf9fa4afee971177408b7969363d9302

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\entry.tcl

                                                          Filesize

                                                          16KB

                                                          MD5

                                                          f9b29ab14304f18e32821a29233be816

                                                          SHA1

                                                          6d0253274d777e081fa36cc38e51c2abb9259d0e

                                                          SHA256

                                                          62d1df52c510a83103badab4f3a77abb1aa3a0e1e21f68ece0cecca2ca2f1341

                                                          SHA512

                                                          698db665e29b29864f9fe65934cca83a5092d81d5130ffd1eac68c51327ae9ebc007a60a60e1af37063017e448ce84a4024d4a412990a1078287b605df344c70

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\fonts.tcl

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          7017b5c1d53f341f703322a40c76c925

                                                          SHA1

                                                          57540c56c92cc86f94b47830a00c29f826def28e

                                                          SHA256

                                                          0eb518251fbe9cf0c9451cc1fef6bb6aee16d62da00b0050c83566da053f68d0

                                                          SHA512

                                                          fd18976a8fbb7e59b12944c2628dbd66d463b2f7342661c8f67160df37a393fa3c0ce7fdda31073674b7a46e0a0a7d0a7b29ebe0d9488afd9ef8b3a39410b5a8

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\menubutton.tcl

                                                          Filesize

                                                          4KB

                                                          MD5

                                                          db24841643cebd38d5ffd1d42b42e7f4

                                                          SHA1

                                                          e394af7faf83fad863c7b13d855fcf3705c4f1c7

                                                          SHA256

                                                          81b0b7818843e293c55ff541bd95168db51fe760941d32c7cde9a521bb42e956

                                                          SHA512

                                                          380272d003d5f90c13571952d0c73f5fce2a22330f98f29707f3d5bfc29c99d9bf11a947cf2ca64cf7b8df5e4afe56ffa00f9455bb30d15611fc5c86130346be

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\notebook.tcl

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          82c9dfc512e143dda78f91436937d4dd

                                                          SHA1

                                                          26abc23c1e0c201a217e3cea7a164171418973b0

                                                          SHA256

                                                          d1e5267cde3d7be408b4c94220f7e1833c9d452bb9ba3e194e12a5eb2f9adb80

                                                          SHA512

                                                          a9d3c04ad67e0dc3f1c12f9e21ef28a61fa84dbf710313d4ca656bdf35dfbbfba9c268c018004c1f5614db3a1128025d795bc14b4fffaa5603a5313199798d04

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\panedwindow.tcl

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          a12915fa5caf93e23518e9011200f5a4

                                                          SHA1

                                                          a61f665a408c10419fb81001578d99b43d048720

                                                          SHA256

                                                          ce0053d637b580170938cf552b29ae890559b98eb28038c2f0a23a265ddeb273

                                                          SHA512

                                                          669e1d66f1223cca6ceb120914d5d876bd3cf401ee4a46f35825361076f19c7341695596a7dbb00d6cff4624666fb4e7a2d8e7108c3c56a12bda7b04e99e6f9a

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\progress.tcl

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          b0074341a4bda36bcdff3ebcae39eb73

                                                          SHA1

                                                          d070a01cc5a787249bc6dad184b249c4dd37396a

                                                          SHA256

                                                          a9c34f595e547ce94ee65e27c415195d2b210653a9ffcfb39559c5e0fa9c06f8

                                                          SHA512

                                                          af23563602886a648a42b03cc5485d84fcc094ab90b08df5261434631b6c31ce38d83a3a60cc7820890c797f6c778d5b5eff47671ce3ee4710ab14c6110dcc35

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\scale.tcl

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          b41a9df31924dea36d69cb62891e8472

                                                          SHA1

                                                          4c2877fbb210fdbbde52ea8b5617f68ad2df7b93

                                                          SHA256

                                                          25d0fe2b415292872ef7acdb2dfa12d04c080b7f9b1c61f28c81aa2236180479

                                                          SHA512

                                                          a50db6da3d40d07610629de45f06a438c6f2846324c3891c54c99074cfb7beed329f27918c8a85badb22c6b64740a2053b891f8e5d129d9b0a1ff103e7137d83

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\scrollbar.tcl

                                                          Filesize

                                                          3KB

                                                          MD5

                                                          93181dbe76ef9c39849a09242d6df8c0

                                                          SHA1

                                                          de3b47afc3e5371bf1cd0541790a9b78a97570ab

                                                          SHA256

                                                          5932043286a30a3cffb2b6ce68ccdb9172a718f32926e25d3a962ae63cad515c

                                                          SHA512

                                                          5c85284e063a5de17f6ce432b3ef899d046a78725bd1f930229576bed1116c03a3ee0611b988e9903f47da8f694483e5a76464450c48eb14622f6784004b8f7e

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\sizegrip.tcl

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          3c8916a58c6ee1d61836e500a54c9321

                                                          SHA1

                                                          54f3f709698fad020a048668749cb5a09ede35ab

                                                          SHA256

                                                          717d2edd71076ea059903c7144588f8bbd8b0afe69a55cbf23953149d6694d33

                                                          SHA512

                                                          2b71569a5a96cac1b708e894a2466b1054c3fae5405e10799b182012141634bd2a7e9e9f516658e1a6d6e9e776e397608b581501a6cfe2eb4ec54459e9ecb267

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\spinbox.tcl

                                                          Filesize

                                                          4KB

                                                          MD5

                                                          86bca3ab915c2774425b70420e499140

                                                          SHA1

                                                          fd4798d79eeba9cffabcb2548068591db531a716

                                                          SHA256

                                                          51f8a6c772648541684b48622ffe41b77871a185a8acd11e9dec9ec41d65d9cd

                                                          SHA512

                                                          659fb7e1631ed898e3c11670a04b953eb05cecb42a3c5efbdd1bd97a7f99061920fd5db3915476f224bb2c72358623e1b474b0fc3fbb7fd3734487b87a388fd7

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\treeview.tcl

                                                          Filesize

                                                          8KB

                                                          MD5

                                                          46b1d0eadbcf11ac51dd14b1a215ae04

                                                          SHA1

                                                          339026ae9533f4c331adf8c71799b222ddd89d4f

                                                          SHA256

                                                          db6faa8540c322f3e314968256d8afff39a1e4700ec17c7efe364241f355d80f

                                                          SHA512

                                                          0fc81426857949d5ac9fe7ff3c85a1270bd35bf6e6eaf3fe7ae0de22a0c0e5cd96d6c9471216dc1da673fad949ca96a3751c3d3222474d2206aa9d8a455ba12e

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\ttk.tcl

                                                          Filesize

                                                          4KB

                                                          MD5

                                                          e38b399865c45e49419c01ff2addce75

                                                          SHA1

                                                          f8a79cbc97a32622922d4a3a5694bccb3f19decb

                                                          SHA256

                                                          61baa0268770f127394a006340d99ce831a1c7ad773181c0c13122f7d2c5b7f6

                                                          SHA512

                                                          285f520b648f5ec70dd79190c3b456f4d6da2053210985f9e2c84139d8d51908296e4962b336894ee30536f09fae84b912bc2abf44a7011620f66cc5d9f71a8c

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\utils.tcl

                                                          Filesize

                                                          8KB

                                                          MD5

                                                          65193fe52d77b8726b75fbf909ee860a

                                                          SHA1

                                                          991dedd4666462dd9776fdf6c21f24d6cf794c85

                                                          SHA256

                                                          c7cc9a15cfa999cf3763772729cc59f629e7e060af67b7d783c50530b9b756e1

                                                          SHA512

                                                          e43989f5f368d2e19c9a3521fb82c6c1dd9eeb91df936a980ffc7674c8b236cb84e113908b8c9899b85430e8fc30315bdec891071822d701c91c5978096341b7

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\vistaTheme.tcl

                                                          Filesize

                                                          9KB

                                                          MD5

                                                          ed071b9cea98b7594a7e74593211bd38

                                                          SHA1

                                                          90998a1a51bcbaa3b4d72b08f5cbf19e330148d2

                                                          SHA256

                                                          98180630fc1e8d7d7c1b20a5ff3352c8bd8cf259dd4eb3b829b8bd4cb8ae76a4

                                                          SHA512

                                                          60c1ea45481af5cfa3c5e579514dd3f4ac6c8d168553f374d0a3b3e1342e76cb71fa825c306233e185bed057e2b99877baf9a5e88ebd48cf6de171a8e7f6a230

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\winTheme.tcl

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          0ae8205dfba3c9b8eead01ac11c965d6

                                                          SHA1

                                                          61e8d2e909cf46886f6ea8571d4234dd336fefb3

                                                          SHA256

                                                          93e4011caa9f01802d6dd5e02c3104e619084799e949974dfee5e0c94d1e3952

                                                          SHA512

                                                          e4448b922ca0fb425f879988537b9db8f8c8a5a773805607574499506fdd9deeb9cd41660e497002f78727afbe3bec17d9674e99cef4a9d66ffd9c4536afe153

                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23042\tk\ttk\xpTheme.tcl

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          bd892a940333c1b804df5c4594b0a5e6

                                                          SHA1

                                                          4e187f09f45898749cfe7860edef0d5eb83d764e

                                                          SHA256

                                                          196c6fef40fb6296d7762f30058aa73273083906f72f490e69fc77f1d5589b88

                                                          SHA512

                                                          8273a8f789d695601a7bc74dfa2a6bd7fe280ec528869f502a578e90b6dd1613c4bcc5b6cd0d93a5ca0e6538be740cd370f634da84064213e1f50b919ebf35b8

                                                        • memory/632-1040-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/632-1039-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/1028-1034-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/1100-1021-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/1304-1046-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/1336-1059-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/1356-1032-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/1460-1012-0x0000000000340000-0x0000000000349000-memory.dmp

                                                          Filesize

                                                          36KB

                                                        • memory/1460-1066-0x0000000000340000-0x0000000000349000-memory.dmp

                                                          Filesize

                                                          36KB

                                                        • memory/1600-1051-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/1608-1029-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/1608-1030-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/1684-1055-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/1760-1017-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/1760-1016-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/1768-1042-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/1768-1043-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/2340-1065-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/2756-1053-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/3120-1063-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/3448-1019-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/3516-1009-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/3516-1014-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/3540-1027-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/3964-1045-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/4252-1057-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/4400-1061-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/4752-1025-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/4860-1023-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/4976-1049-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/4976-1048-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/5048-1037-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/5048-1036-0x0000000001000000-0x000000000105A000-memory.dmp

                                                          Filesize

                                                          360KB