Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09/03/2025, 04:32

General

  • Target

    VelocitySupportTool.exe

  • Size

    10.1MB

  • MD5

    67462ee5d9b46994eeb4a4c17410a206

  • SHA1

    208514cd39b81476b31edbf2d56f6ef8e9e6870f

  • SHA256

    327e9385019706a31563b32a12a5cff31ca042078a0ccb8c9e668d1bd12a6497

  • SHA512

    ef551052fa54fdc2b7818f3dc6e6163a1301b413762ba69916347e3a4acfd2d9c3e878e732b66c05283f6c922f49a96a00bcd1655d7c2ba2ac363802efa78f94

  • SSDEEP

    196608:SgNsPPpW0RYeIeKkrAW4LQkhf+LYYlrlJQxSQcGKQ999uvqivV9CSxTcf7nL:RKhW0afk0ZLQkhfNYGdH999VivOYeLL

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %port%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/k7RJ4RZQ

Extracted

Family

xworm

Version

5.0

Mutex

0PPzuWGEdxzyPz40

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/0AT3JnEx

aes.plain

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VelocitySupportTool.exe
    "C:\Users\Admin\AppData\Local\Temp\VelocitySupportTool.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Users\Admin\AppData\Roaming\VelocitySupportTool.exe
      "C:\Users\Admin\AppData\Roaming\VelocitySupportTool.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5184
      • C:\Users\Admin\AppData\Roaming\VelocitySupportTools.exe
        "C:\Users\Admin\AppData\Roaming\VelocitySupportTools.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4988
      • C:\Users\Admin\AppData\Roaming\VelocityFix.exe
        "C:\Users\Admin\AppData\Roaming\VelocityFix.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\VelocityFix.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4600
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'VelocityFix.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3780
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4984
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5108
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:5896
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /delete /f /tn "svchost"
          4⤵
            PID:5124
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp483F.tmp.bat""
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4076
            • C:\Windows\system32\timeout.exe
              timeout 3
              5⤵
              • Delays execution with timeout.exe
              PID:4472
      • C:\Users\Admin\AppData\Roaming\VelocitySupport.exe
        "C:\Users\Admin\AppData\Roaming\VelocitySupport.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Users\Admin\AppData\Roaming\VelocitySupport.exe
          "C:\Users\Admin\AppData\Roaming\VelocitySupport.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3052
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:5348

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\VelocitySupportTool.exe.log

      Filesize

      654B

      MD5

      2cbbb74b7da1f720b48ed31085cbd5b8

      SHA1

      79caa9a3ea8abe1b9c4326c3633da64a5f724964

      SHA256

      e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3

      SHA512

      ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\VCRUNTIME140.dll

      Filesize

      117KB

      MD5

      862f820c3251e4ca6fc0ac00e4092239

      SHA1

      ef96d84b253041b090c243594f90938e9a487a9a

      SHA256

      36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

      SHA512

      2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_bz2.pyd

      Filesize

      84KB

      MD5

      057325e89b4db46e6b18a52d1a691caa

      SHA1

      8eab0897d679e223aa0d753f6d3d2119f4d72230

      SHA256

      5ba872caa7fcee0f4fb81c6e0201ceed9bd92a3624f16828dd316144d292a869

      SHA512

      6bc7606869ca871b7ee5f2d43ec52ed295fa5c3a7df31dbd7e955ddb98c0748aff58d67f09d82edcde9d727e662d1550c6a9cf82f9cb7be021159d4b410e7cbc

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_decimal.pyd

      Filesize

      273KB

      MD5

      f465c15e7baceac920dc58a5fb922c1c

      SHA1

      3a5a0156f5288f14938494609d377ede0b67d993

      SHA256

      f4a486a0ca6a53659159a404614c7e7edccb6bfbcdeb844f6cee544436a826cb

      SHA512

      22902c1bcca7f80ed064e1e822c253bc8242b4e15e34a878a623e0a562a11203b45d5ff43904268322a7ef5cebb8e80e5fe1f1f1bcaa972e219348f84a1daf5f

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_hashlib.pyd

      Filesize

      63KB

      MD5

      cf4120bad9a7f77993dd7a95568d83d7

      SHA1

      ac477c046d14c5306aa09bb65015330701ef0f89

      SHA256

      14765e83996fe6d50aedc11bb41d7c427a3e846a6a6293a4a46f7ea7e3f14148

      SHA512

      f905f9d203f86a7b1fc81be3aba51a82174411878c53fd7a62d17f8e26f5010d195f9371fa7400e2e2dc35fda0db0cbe68367fcaf834dd157542e9ee7a9742b6

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_lzma.pyd

      Filesize

      155KB

      MD5

      3e73bc69efb418e76d38be5857a77027

      SHA1

      7bee01096669caa7bec81cdc77d6bb2f2346608c

      SHA256

      6f48e7eba363cb67f3465a6c91b5872454b44fc30b82710dfa4a4489270ce95c

      SHA512

      b6850e764c8849058488f7051dcabff096709b002d2f427a49e83455838d62a9d3fc7b65285702de2b995858ed433e35a0c4da93c2d5ae34684bf624eb59fa6a

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_socket.pyd

      Filesize

      82KB

      MD5

      69c4a9a654cf6d1684b73a431949b333

      SHA1

      3c8886dac45bb21a6b11d25893c83a273ff19e0b

      SHA256

      8daefaff53e6956f5aea5279a7c71f17d8c63e2b0d54031c3b9e82fcb0fb84db

      SHA512

      cadcec9a6688b54b36dbd125210d1a742047167dad308907a3c4e976b68483a8c6144e02d5cf26f887744dc41af63b7731551287bb3ef8bd947c38c277783c16

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tcl_data\auto.tcl

      Filesize

      21KB

      MD5

      97efa9ebe840ea051f9706504c8bd783

      SHA1

      287dea14d47977dcd8edc525fe750c836264db5c

      SHA256

      08113823951619d659eb03a1f6acd2f9500e1264795219125a5df7b83cabcb99

      SHA512

      ab9fc210f3bfd181cc2b93dd348415f67f763b2c7961179a88eba3f7f87e44b21a66ea4ea53715fb88784288c75b8270640f3bc6beafb0e8cc21966068a79bf2

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tcl_data\encoding\cp1252.enc

      Filesize

      1KB

      MD5

      e9117326c06fee02c478027cb625c7d8

      SHA1

      2ed4092d573289925a5b71625cf43cc82b901daf

      SHA256

      741859cf238c3a63bbb20ec6ed51e46451372bb221cfff438297d261d0561c2e

      SHA512

      d0a39bc41adc32f2f20b1a0ebad33bf48dfa6ed5cc1d8f92700cdd431db6c794c09d9f08bb5709b394acf54116c3a1e060e2abcc6b503e1501f8364d3eebcd52

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tcl_data\http1.0\pkgIndex.tcl

      Filesize

      746B

      MD5

      a387908e2fe9d84704c2e47a7f6e9bc5

      SHA1

      f3c08b3540033a54a59cb3b207e351303c9e29c6

      SHA256

      77265723959c092897c2449c5b7768ca72d0efcd8c505bddbb7a84f6aa401339

      SHA512

      7ac804d23e72e40e7b5532332b4a8d8446c6447bb79b4fe32402b13836079d348998ea0659802ab0065896d4f3c06f5866c6b0d90bf448f53e803d8c243bbc63

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tcl_data\init.tcl

      Filesize

      25KB

      MD5

      ffe4e47b5f4f96ec33fb31d52ef0b636

      SHA1

      3a625e493f8778277f65ffef1e0879fbec0e4d0d

      SHA256

      acacce15658dd7ce8f69b1e3d3a94770a22972a8e906eb3b61cd06f0ecd5db59

      SHA512

      dbbfd92ab6d95672f7882f3affb75f31749281c7450c29fcef58b5bdfd4f42b6d1d9f3a50ae0d3aa27e95d48918ed55cde5149751f892538bdd2dc39c618927e

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tcl_data\opt0.4\pkgIndex.tcl

      Filesize

      636B

      MD5

      93a0e83ab0a3545c206dc54e1206e368

      SHA1

      45fd706f83c43a7318358033e553d8c9b3210e4e

      SHA256

      68accee3eb8d0f134f9472c95425190ec08e7793df20a58d7d35325f42804695

      SHA512

      6e18c1bc98bd2d838570fcc68333aeee7fedc746547484fb09f3b7105bd198bd5201a0ce4e647d16655125fa764c676b7ba4bec9c992e37b438e199c708e643a

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tcl_data\package.tcl

      Filesize

      23KB

      MD5

      6a7b6485d3b290fc5d412ed1d62a170d

      SHA1

      50475e80e3969de279edfb1bf8d9c19694c36c0b

      SHA256

      b471cec9056b62d562020b14d69d4bd1f92dfe158afc8ba81c6341836211ca46

      SHA512

      36ced797ec18d4aa68fcce57f6eb510e78508d14646cf43ea2effb6f2cf88529d0cb5a4a136fb1252edbb95cba646bdcd19a8cd90a86b19fc28bb9611e2ccb73

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tcl_data\tclIndex

      Filesize

      7KB

      MD5

      42ec37eee38d6dd33a9fdecd7f1cd0aa

      SHA1

      6c8c93e5e5350d93f63f3f99d587ab8fb5aa496b

      SHA256

      577f042bbe640e2739606a1f76098abdb8bd1d1f31526402fb82b21091644f65

      SHA512

      37d61f27da79c494d225543828c9a29f1397c57506d609481036bfa2a336ec3110e6d10670edcf211a5714629eeb7e16dbf04a8388bc6bb420584edc06dc534d

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tcl_data\tm.tcl

      Filesize

      11KB

      MD5

      5746f2c35a7c434a78cc127f8d522e8c

      SHA1

      0b438de8ddc24b2d805a5db2c8c9432a52c6e53a

      SHA256

      f0cc13daca21fee538cca757aa09e88a969a85174eda26e61e573dda6c7ba413

      SHA512

      0a9038474b7bdb9469b7684b5b3867982a29bebbdf017d2dd21edcdd79dd3f67f4d99cdc0a11b3aa7b170b25644ead896489edb9a9a692ca654c0e7bed95ff42

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\button.tcl

      Filesize

      21KB

      MD5

      aeb53f7f1506cdfdfe557f54a76060ce

      SHA1

      ebb3666ee444b91a0d335da19c8333f73b71933b

      SHA256

      1f5dd8d81b26f16e772e92fd2a22accb785004d0ed3447e54f87005d9c6a07a5

      SHA512

      acdad4df988df6b2290fc9622e8eaccc31787fecdc98dcca38519cb762339d4d3fb344ae504b8c7918d6f414f4ad05d15e828df7f7f68f363bec54b11c9b7c43

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\entry.tcl

      Filesize

      18KB

      MD5

      ce819200e8cd36e4458b4cf47cfe9107

      SHA1

      d04357d9e236f83bb0d2f5db97e9ee228c34ec80

      SHA256

      6ac78f764434f932d37e8183aa6db5d04eb1848b774c92f7abc243ecb7d4a59b

      SHA512

      6576612c380ab04fa75724c72108a2f386d7f75c9db7a082445778f675e268d0594280a7644aa9ff3ac3d29026327b84a0990ee0c7a9f94bbac3ae63cf91e1de

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\icons.tcl

      Filesize

      10KB

      MD5

      995a0a8f7d0861c268aead5fc95a42ea

      SHA1

      21e121cf85e1c4984454237a646e58ec3c725a72

      SHA256

      1264940e62b9a37967925418e9d0dc0befd369e8c181b9bab3d1607e3cc14b85

      SHA512

      db7f5e0bc7d5c5f750e396e645f50a3e0cde61c9e687add0a40d0c1aa304ddfbceeb9f33ad201560c6e2b051f2eded07b41c43d00f14ee435cdeee73b56b93c7

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\listbox.tcl

      Filesize

      14KB

      MD5

      804e6dce549b2e541986c0ce9e75e2d1

      SHA1

      c44ee09421f127cf7f4070a9508f22709d06d043

      SHA256

      47c75f9f8348bf8f2c086c57b97b73741218100ca38d10b8abdf2051c95b9801

      SHA512

      029426c4f659848772e6bb1d8182eb03d2b43adf68fcfcc1ea1c2cc7c883685deda3fffda7e071912b9bda616ad7af2e1cb48ce359700c1a22e1e53e81cae34b

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\menu.tcl

      Filesize

      39KB

      MD5

      994cbd4038eeef9991f7d6086904166f

      SHA1

      24c05d55e80ddc36fd207eeb7c0fa262573d67d2

      SHA256

      ae4ee8400174c798337b9c60867cbc94f811b249ebe6dea21ec6f960bcf5f8cb

      SHA512

      d1a9c8c89025b305af52f1510b3d4d2a3c556847d345844367ff34c89b917f1646de81f08994ea1697f8f8526d9fd2602f9ac440b52097cab5951901dbbd6ebd

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\panedwindow.tcl

      Filesize

      5KB

      MD5

      286c01a1b12261bc47f5659fd1627abd

      SHA1

      4ca36795cab6dfe0bbba30bb88a2ab71a0896642

      SHA256

      aa4f87e41ac8297f51150f2a9f787607690d01793456b93f0939c54d394731f9

      SHA512

      d54d5a89b7408a9724a1ca1387f6473bdad33885194b2ec5a524c7853a297fd65ce2a57f571c51db718f6a00dce845de8cf5f51698f926e54ed72cdc81bcfe54

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\pkgIndex.tcl

      Filesize

      376B

      MD5

      62a8e4b5aeb35286e3b1d54973139a13

      SHA1

      1064e7e2765f9aea5d06ebdd932c689a877613d5

      SHA256

      6127926b94db2992ab450fc6cc2ec3d071f7bbc856656d0ae20cc3fd4036f547

      SHA512

      919e9a1c7d02cc886bb3901fd0d2966df0f5456f4646310d5762cd74c5b78f2b1b542b3be78e22dc9b070ea1bbf401dda7ecba223b1b1851feea028047bcbe8d

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\scale.tcl

      Filesize

      8KB

      MD5

      d45202d3d2d052d4c6bfe8d1322aab39

      SHA1

      8cdf184ac2e9299b2b2a107a64e9d1803aa298de

      SHA256

      0747a387fdd1b2c7135eceae7b392ed52e1d1ebf3ffa90febe886dbc0981eb74

      SHA512

      27b005f955bae00d15c4492e7bd3ebdc5ee3bf9c164c418198b4bd185709c8810aa6cf76cbcc07eeb4c1d20f8c76ef8df8b219563c18b88c94954c910bff575d

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\scrlbar.tcl

      Filesize

      12KB

      MD5

      5249cd1e97e48e3d6dec15e70b9d7792

      SHA1

      612e021ba25b5e512a0dfd48b6e77fc72894a6b9

      SHA256

      eec90404f702d3cfbfaec0f13bf5ed1ebeb736bee12d7e69770181a25401c61f

      SHA512

      e4e0ab15eb9b3118c30cd2ff8e5af87c549eaa9b640ffd809a928d96b4addefb9d25efdd1090fbd0019129cdf355bb2f277bc7194001ba1d2ed4a581110ceafc

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\spinbox.tcl

      Filesize

      16KB

      MD5

      eaa36f0aa69ae19ddbdd0448fbad9d4d

      SHA1

      eb0adb4f4d937bac2f17480adaf6f948262e754d

      SHA256

      747889c3086c917a34554a9dc495bc0c08a03fd3a5828353ed2a64b97f376835

      SHA512

      c8368f19ec6842ed67073b9fc9c9274107e643324cb23b28c54df63fb720f63b043281b30dbea053d08481b0442a87465f715a8aa0711b01ce83ff7b9f8a4f4c

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\text.tcl

      Filesize

      34KB

      MD5

      016613531555c4f30f670dab58f10b3d

      SHA1

      3afc8aa3e10950d79d1003b0810f2e0dc2135eb9

      SHA256

      f7ecc5ae6eb297c79aad5cfc200b29c4e72409641fa369c5cdbba30ae41e982a

      SHA512

      c5d071fc8cb68c5985e74ab7e90367e9261b291474689c37abd7f921716053e9d5e9446a45c5e91f3bb927589270e818e22e2d675acbe04e0627ecd5d532bc05

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\tk.tcl

      Filesize

      23KB

      MD5

      7e46d32c3e70dbf17663f57e17d18dfe

      SHA1

      394dd3cde6a7e41855917060f4388478a0a84668

      SHA256

      b7fd24177b17f67da2ca671f711309c65cf246be1fd0cf4f1ab8f3ea9ca2c3f1

      SHA512

      6125e9b6c213e48e4a7a47acc0be3b930ddd9aca2132817f1906a2453e0d0b8292e7b2090bab8712856d12d2cf4d119238f16fae0fb57dd66da4db8fb3d92b0d

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\ttk\button.tcl

      Filesize

      2KB

      MD5

      d4bf1af5dcdd85e3bd11dbf52eb2c146

      SHA1

      b1691578041319e671d31473a1dd404855d2038b

      SHA256

      e38a9d1f437981aa6bf0bdd074d57b769a4140c0f7d9aff51743fe4ecc6dfddf

      SHA512

      25834b4b231f4ff1a88eef67e1a102d1d0546ec3b0d46856258a6be6bbc4b381389c28e2eb60a01ff895df24d6450cd16ca449c71f82ba53ba438a4867a47dcd

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\ttk\cursors.tcl

      Filesize

      4KB

      MD5

      1a799fe3754307a5aade98c367e2f5d7

      SHA1

      c64be4b77f0d298610f4ee20fcebbaee3c8b5f22

      SHA256

      5b33f32b0139663347d6cf70a5a838f8e4554e0e881e97c8478b77733162ea73

      SHA512

      89f367f9a59730bcdfc5abde0e35a10b72a1f19c68a768ba4524c938ef5c5caf094c1bfa8fc74173f65201f6617544223c2143252a9f691ee9aaa7543315179f

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\ttk\fonts.tcl

      Filesize

      5KB

      MD5

      8514cf728a5782e457c50d7c61740ce5

      SHA1

      ede61c428d1865f10ae093d5c4bef29c0ec7e8ce

      SHA256

      6574067a91858506460ac44ddf8cf9270e81d67b2feff2a43b4d5f774568a5ec

      SHA512

      2e24f15887193ffb884ab6af9ecf619ef913e3f6c6dfb0fc980bfb59a57ffec56b68dd36935a2998fbc66d12ef40a58dc3b3f278ec0e21d84dffead6a80c4c96

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\ttk\menubutton.tcl

      Filesize

      6KB

      MD5

      aec91dd23de04196af5eb31e8bbd0946

      SHA1

      bdf5a5a42a147d7484e5a2966ea949fa68f52348

      SHA256

      0935fb97b6628f055baeb2e2babbf2a6c8905260e1107972b0e7a1df0752e180

      SHA512

      6ea4a2ec378e6cbabbf8ff20fb1cad0c68a90e5089f20d195fef2ee4ff9259bd3b622378e7203bd238402140f7eab7e316b8a8f9c4b6c0d3d3acbe81f0a25ea4

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\ttk\notebook.tcl

      Filesize

      5KB

      MD5

      39aec76c4e7b810873545c6a137accf3

      SHA1

      165372dccdd018d980aa2167094a4e0fa82b65f1

      SHA256

      b1210147f9daf3068de3d28d4b18c04ecfa8c8574e3e0ad275c1d0d75e9a99b2

      SHA512

      759436ca4462df6c217f1502d1350735004edd31472fdaa9860f3fd8fbc2f4978be2b5a57993c37b9dce4a8237840f50d620ba95c22900f658b29a2ac38a5218

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\ttk\progress.tcl

      Filesize

      1KB

      MD5

      dbf3bf0e8f04e9435e9561f740dfc700

      SHA1

      c7619a05a834efb901c57dcfec2c9e625f42428f

      SHA256

      697cc0a75ae31fe9c2d85fb25dca0afa5d0df9c523a2dfad2e4a36893be75fba

      SHA512

      d3b323dfb3eac4a78da2381405925c131a99c6806af6fd8041102162a44e48bf166982a4ae4aa142a14601736716f1a628d9587e292fa8e4842be984374cc192

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\ttk\scale.tcl

      Filesize

      2KB

      MD5

      f1c33cc2d47115bbecd2e7c2fcb631a7

      SHA1

      0123a961242ed8049b37c77c726db8dbd94c1023

      SHA256

      b909add0b87fa8ee08fd731041907212a8a0939d37d2ff9b2f600cd67dabd4bb

      SHA512

      96587a8c3555da1d810010c10c516ce5ccab071557a3c8d9bd65c647c7d4ad0e35cbed0788f1d72bafac8c84c7e2703fc747f70d9c95f720745a1fc4a701c544

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\ttk\scrollbar.tcl

      Filesize

      3KB

      MD5

      36ef078c823f7604f14d5d6d0a3a301b

      SHA1

      3e60bbdd52e327a77e6bb06c6fc7be0eb62780ff

      SHA256

      c223da92b7f5a7cb7f4f4da89cf94ecd472c6aad40bf2455bca7ab2409e459fc

      SHA512

      ee80d338411ced4ec38167ad0a60fb4a04e69a124f3ee5e21e081beeeccea342e55e713b3bf7a776f27f80eb6c2f5a49979cc338a4f2d44b1b8cfc641074f91f

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\ttk\ttk.tcl

      Filesize

      5KB

      MD5

      4a81a6219cfc1b056471d07624ee3dbd

      SHA1

      0a8e6b4a38cdba6a325d8668fce3442217392e8a

      SHA256

      685398e8db93aebbabfed795e91a42a87aa0e2a2cf23bfcffd70fea085a7ad5e

      SHA512

      5917febd222b1ad14ca871c11817d875d1ff019256eace148af49ba24be8f8fcf75debc40c6ba54368585c711dd9e056054bfd4133ea672f27d34a3d712bad6e

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tk_data\ttk\utils.tcl

      Filesize

      8KB

      MD5

      4070fde3f342eebf933e601593d9748c

      SHA1

      e31dfd6d1d29b4a040aa448a25f2161afdfb59ef

      SHA256

      b9b73e5bcd85c8fe00628332f0ab0c4a0ffbb59f7b4e9d6cdc92762a5bcd8d76

      SHA512

      43aaaeccc5819391be93d11c9b264592e429d0041716aa725efcf7c71ccb5c370ad1fea89acb3c294ce266895b8a398d24bad5aff74091c8349cd75ab4a4b02f

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\_tkinter.pyd

      Filesize

      66KB

      MD5

      653b8194cafca1902f451fdd2563b770

      SHA1

      701497c55588a9c2d63a3eb16651dd22d47140c2

      SHA256

      6edeccc758733e44edaeff20e403ede9a782335f7bd80975697547087c32c5cc

      SHA512

      671286359096a454338d1c371e576f24c6ae1eb6cbfbf7ddc0044dd2dc5d14f6aa0044c8112512839f6857eb70bcb98544b149b16392ca9ce09d207134644ccd

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\base_library.zip

      Filesize

      1.3MB

      MD5

      9d54fc30bb44a4bbf70c5870b746239f

      SHA1

      044df6dc160a78c74f0d118167ec37c789dcadfa

      SHA256

      e32714927efcb84db5affdc4c0237de7c8e9412182073d570855376aff0bfcbf

      SHA512

      964c83b9f98670736ec85ba8bb00088717334f1d5ff0dd34e71c9177a89c0c25d27d5a9992a278fbadfd832e9e8308294d3f78d41ae68b21edc63106a0421b39

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\libcrypto-3.dll

      Filesize

      5.0MB

      MD5

      123ad0908c76ccba4789c084f7a6b8d0

      SHA1

      86de58289c8200ed8c1fc51d5f00e38e32c1aad5

      SHA256

      4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

      SHA512

      80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\python313.dll

      Filesize

      5.8MB

      MD5

      501080884bed38cb8801a307c9d7b7b4

      SHA1

      881b250cc8f4fa4f75111ac557a4fde8e1e217af

      SHA256

      bf68cf819a1e865170430c10e91c18b427aef88db1da1742020443864aa2b749

      SHA512

      63d74a4871d1c72c2a79ae8a5d380070f9d2128c16949c3ad36c9862fcc4dab738137ed3d51caf0bc46b36655f8bd8a2d425d68200123415ee8d4de0e1cbebc9

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\select.pyd

      Filesize

      31KB

      MD5

      2663e22900ab5791c6687a264473ae1e

      SHA1

      d8db587b6c632200ae13be880cc824cdc8390df9

      SHA256

      baee284995b22d495fd12fa8378077e470978db1522c61bfb9af37fb827f33d1

      SHA512

      5f29ff4288b9db33976f5f79b9fd07c4900a560bb41fe98c93a33da7a36c0981ffd71f460e81e13e4f6a2debafa6d9284bc1a728734752ba5ad5fbd766659e80

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\tcl86t.dll

      Filesize

      1.8MB

      MD5

      3688caba94d9a1dc124df80aef41ac47

      SHA1

      66b314fc54b1d2475bfb655facacf8a8d6eacfed

      SHA256

      31560ca3b0eec014013405e9652b9261824232883749f0461d7d4e5f7faea3ab

      SHA512

      f3cd68e26f008b27370bd5222b6dafd8bb5f312a885db4e2f8f6502a719403263412f2aa7c8451b4ab7c59e674e3746710ce5a3c3c09f0cdb0266f82f226e9f4

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\tcl8\8.5\msgcat-1.6.1.tm

      Filesize

      34KB

      MD5

      e102bf017d302c494c1dbd449b040053

      SHA1

      58b16b222f881271e09f7775c46817bbc4bed81e

      SHA256

      adca186be560f2236265f538d4cb6df1171bed91192118796988bb9c08a4bc7c

      SHA512

      7001af784de0663bbf634842c12d833e447221a0fef05723373db3281d5bb9545c3c12103413137451730fba6207a1dc318b662aa4da6a72fe6944577c199da2

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\tk86t.dll

      Filesize

      1.5MB

      MD5

      d379810228b51c2571d9071eed3286b8

      SHA1

      a643cda1683168e27a209b397d0eea7bc14c5103

      SHA256

      34d402f3d6a237aac1165a010016ac032e0ae1a86dcfa03dda49ebfc0af40cad

      SHA512

      f195c4d38f3e1d6853efae68ef50a2d3e70fc0f3840aa9aa2c1cddaec6a311e60cd86fc84dcdf0d4febf4d0e94bb89238c1408c5781302bbfaeafc613e10084a

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\unicodedata.pyd

      Filesize

      694KB

      MD5

      c0b4c55ce3711af914b2015f707e4452

      SHA1

      f1c1e9f8a461cfee1199d2100f5c0796733518b6

      SHA256

      a67eec238162fde20ac24ca7df931792734aad0611be22d1b3a71bc15acf72f3

      SHA512

      fa6bd9223898ef0c54ca9a67b10207bfce152eadbaec4c91d4e951d0790f455066f5095ed739fa2452aea1420d154beb00bfa9e6e10b46bed687c5d0d7484900

    • C:\Users\Admin\AppData\Local\Temp\_MEI23362\zlib1.dll

      Filesize

      144KB

      MD5

      de2e3379deeacbe476b9ee8ddeac7ffe

      SHA1

      b112c267f5a6e3d06809896708d9ef9f7c118462

      SHA256

      94675de9234f00e75c73e4973f8fb49a272a1df8003337205cd1b15fb642a168

      SHA512

      0dbe2d131f41258c81e931bbc459051b26de488030a0ad20cb1d2d8ce8cce0a1ddd17a7049a2878368d7e535428bdc6c7886265f43be27fbc6aeed784080c93b

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_op5qutqu.kth.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\VelocityFix.exe

      Filesize

      39KB

      MD5

      53bfc0f8986b70724e4823f47241f6aa

      SHA1

      62e79122cea2f27e6f093fa484e5aa7795088ccc

      SHA256

      9286f18acfd1a8277f23da9a1079b571587c9bd5f28dbcff51845b933595426c

      SHA512

      5abbfbcc2e5cff491f4d213f4b83047f50e1de77d67631d510c7b540965c5f03a7611a0f1e79479d3a05a1e2f05fee6180b47ececc96c78f2e38ee5fa06430f2

    • C:\Users\Admin\AppData\Roaming\VelocitySupport.exe

      Filesize

      9.8MB

      MD5

      38c4223ac857cb56e3014d33c2062d05

      SHA1

      d32150012ab49dad1f1c7ad3b68b2e3c483f81f5

      SHA256

      cbcb51837d0ebd8fcae0dfa61ba516c103c34ca56a0aef400a2d14e9610cb43e

      SHA512

      f000154ce3e2fb06fc98d1cf8d867996c0fc2747aefc24a7d091a13443316396e24080aafffdb048de1b37ab360265afe7cee31ab07c7eb246e293b50c0edfa7

    • C:\Users\Admin\AppData\Roaming\VelocitySupportTool.exe

      Filesize

      250KB

      MD5

      1904b43012a89c4ec5b3c82c7f7e313e

      SHA1

      3b0eedb1ba0bff205b9d099dd355091229007d04

      SHA256

      1446224da9810c06e7336730dab3811c39c8d1d4b200c4e7d568b1440b432f61

      SHA512

      c37e6bba9776516201c28367dcb541ac108a1def13d72eaf311800710c854a794835b7b92075e3b5d61ff3c500e1446004479065e418e3cb0dfb41963123a06e

    • C:\Users\Admin\AppData\Roaming\VelocitySupportTools.exe

      Filesize

      103KB

      MD5

      3d47fe184f91ceb1bd0d4c213da5ebfa

      SHA1

      05ca3411a2b89f0c7884024f48b51e7574862992

      SHA256

      f0879c8017351b9cebbb546ea14f323ddb777cd97e435bb2de904ac28aa8525f

      SHA512

      1975ed404e30d674806a8209982cf5c81ec7b057178e5597195ca89d79406ddc1edcd25a3e6098e74ac5ce220e9a9975cb2bcbff4d2de8abfa7952c1902ff256

    • memory/1160-1-0x0000000000E00000-0x0000000001814000-memory.dmp

      Filesize

      10.1MB

    • memory/1160-0-0x00007FFF943F3000-0x00007FFF943F5000-memory.dmp

      Filesize

      8KB

    • memory/1888-50-0x0000000000DC0000-0x0000000000DD0000-memory.dmp

      Filesize

      64KB

    • memory/3052-1094-0x00007FFF9ABD0000-0x00007FFF9ABF9000-memory.dmp

      Filesize

      164KB

    • memory/3780-1069-0x0000016C24820000-0x0000016C2496F000-memory.dmp

      Filesize

      1.3MB

    • memory/4600-1059-0x0000013C6B620000-0x0000013C6B76F000-memory.dmp

      Filesize

      1.3MB

    • memory/4600-1056-0x0000013C6B5E0000-0x0000013C6B602000-memory.dmp

      Filesize

      136KB

    • memory/4984-1079-0x000002CFDA9C0000-0x000002CFDAB0F000-memory.dmp

      Filesize

      1.3MB

    • memory/4988-41-0x0000000000F30000-0x0000000000F50000-memory.dmp

      Filesize

      128KB

    • memory/5108-1089-0x00000297EAE90000-0x00000297EAFDF000-memory.dmp

      Filesize

      1.3MB

    • memory/5184-49-0x00007FFF943F0000-0x00007FFF94EB2000-memory.dmp

      Filesize

      10.8MB

    • memory/5184-13-0x0000000000970000-0x00000000009B4000-memory.dmp

      Filesize

      272KB

    • memory/5184-14-0x00007FFF943F0000-0x00007FFF94EB2000-memory.dmp

      Filesize

      10.8MB