Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2025, 04:09

General

  • Target

    VelocitySupportTool.exe

  • Size

    10.1MB

  • MD5

    67462ee5d9b46994eeb4a4c17410a206

  • SHA1

    208514cd39b81476b31edbf2d56f6ef8e9e6870f

  • SHA256

    327e9385019706a31563b32a12a5cff31ca042078a0ccb8c9e668d1bd12a6497

  • SHA512

    ef551052fa54fdc2b7818f3dc6e6163a1301b413762ba69916347e3a4acfd2d9c3e878e732b66c05283f6c922f49a96a00bcd1655d7c2ba2ac363802efa78f94

  • SSDEEP

    196608:SgNsPPpW0RYeIeKkrAW4LQkhf+LYYlrlJQxSQcGKQ999uvqivV9CSxTcf7nL:RKhW0afk0ZLQkhfNYGdH999VivOYeLL

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

0PPzuWGEdxzyPz40

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/0AT3JnEx

aes.plain

Extracted

Family

xworm

Attributes
  • Install_directory

    %port%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/k7RJ4RZQ

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VelocitySupportTool.exe
    "C:\Users\Admin\AppData\Local\Temp\VelocitySupportTool.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Roaming\VelocitySupportTool.exe
      "C:\Users\Admin\AppData\Roaming\VelocitySupportTool.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Users\Admin\AppData\Roaming\VelocitySupportTools.exe
        "C:\Users\Admin\AppData\Roaming\VelocitySupportTools.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:100
      • C:\Users\Admin\AppData\Roaming\VelocityFix.exe
        "C:\Users\Admin\AppData\Roaming\VelocityFix.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:856
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\VelocityFix.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5072
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'VelocityFix.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4196
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3460
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1828
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1428
    • C:\Users\Admin\AppData\Roaming\VelocitySupport.exe
      "C:\Users\Admin\AppData\Roaming\VelocitySupport.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4772
      • C:\Users\Admin\AppData\Roaming\VelocitySupport.exe
        "C:\Users\Admin\AppData\Roaming\VelocitySupport.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1988
  • C:\Users\Admin\AppData\Roaming\svchost.exe
    C:\Users\Admin\AppData\Roaming\svchost.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4472
  • C:\Users\Admin\AppData\Roaming\svchost.exe
    C:\Users\Admin\AppData\Roaming\svchost.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1840
  • C:\Users\Admin\AppData\Roaming\svchost.exe
    C:\Users\Admin\AppData\Roaming\svchost.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\VelocitySupportTool.exe.log

    Filesize

    654B

    MD5

    2ff39f6c7249774be85fd60a8f9a245e

    SHA1

    684ff36b31aedc1e587c8496c02722c6698c1c4e

    SHA256

    e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

    SHA512

    1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\VCRUNTIME140.dll

    Filesize

    117KB

    MD5

    862f820c3251e4ca6fc0ac00e4092239

    SHA1

    ef96d84b253041b090c243594f90938e9a487a9a

    SHA256

    36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

    SHA512

    2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_bz2.pyd

    Filesize

    84KB

    MD5

    057325e89b4db46e6b18a52d1a691caa

    SHA1

    8eab0897d679e223aa0d753f6d3d2119f4d72230

    SHA256

    5ba872caa7fcee0f4fb81c6e0201ceed9bd92a3624f16828dd316144d292a869

    SHA512

    6bc7606869ca871b7ee5f2d43ec52ed295fa5c3a7df31dbd7e955ddb98c0748aff58d67f09d82edcde9d727e662d1550c6a9cf82f9cb7be021159d4b410e7cbc

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_decimal.pyd

    Filesize

    273KB

    MD5

    f465c15e7baceac920dc58a5fb922c1c

    SHA1

    3a5a0156f5288f14938494609d377ede0b67d993

    SHA256

    f4a486a0ca6a53659159a404614c7e7edccb6bfbcdeb844f6cee544436a826cb

    SHA512

    22902c1bcca7f80ed064e1e822c253bc8242b4e15e34a878a623e0a562a11203b45d5ff43904268322a7ef5cebb8e80e5fe1f1f1bcaa972e219348f84a1daf5f

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_hashlib.pyd

    Filesize

    63KB

    MD5

    cf4120bad9a7f77993dd7a95568d83d7

    SHA1

    ac477c046d14c5306aa09bb65015330701ef0f89

    SHA256

    14765e83996fe6d50aedc11bb41d7c427a3e846a6a6293a4a46f7ea7e3f14148

    SHA512

    f905f9d203f86a7b1fc81be3aba51a82174411878c53fd7a62d17f8e26f5010d195f9371fa7400e2e2dc35fda0db0cbe68367fcaf834dd157542e9ee7a9742b6

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_lzma.pyd

    Filesize

    155KB

    MD5

    3e73bc69efb418e76d38be5857a77027

    SHA1

    7bee01096669caa7bec81cdc77d6bb2f2346608c

    SHA256

    6f48e7eba363cb67f3465a6c91b5872454b44fc30b82710dfa4a4489270ce95c

    SHA512

    b6850e764c8849058488f7051dcabff096709b002d2f427a49e83455838d62a9d3fc7b65285702de2b995858ed433e35a0c4da93c2d5ae34684bf624eb59fa6a

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_socket.pyd

    Filesize

    82KB

    MD5

    69c4a9a654cf6d1684b73a431949b333

    SHA1

    3c8886dac45bb21a6b11d25893c83a273ff19e0b

    SHA256

    8daefaff53e6956f5aea5279a7c71f17d8c63e2b0d54031c3b9e82fcb0fb84db

    SHA512

    cadcec9a6688b54b36dbd125210d1a742047167dad308907a3c4e976b68483a8c6144e02d5cf26f887744dc41af63b7731551287bb3ef8bd947c38c277783c16

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tcl_data\auto.tcl

    Filesize

    21KB

    MD5

    97efa9ebe840ea051f9706504c8bd783

    SHA1

    287dea14d47977dcd8edc525fe750c836264db5c

    SHA256

    08113823951619d659eb03a1f6acd2f9500e1264795219125a5df7b83cabcb99

    SHA512

    ab9fc210f3bfd181cc2b93dd348415f67f763b2c7961179a88eba3f7f87e44b21a66ea4ea53715fb88784288c75b8270640f3bc6beafb0e8cc21966068a79bf2

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tcl_data\encoding\cp1252.enc

    Filesize

    1KB

    MD5

    e9117326c06fee02c478027cb625c7d8

    SHA1

    2ed4092d573289925a5b71625cf43cc82b901daf

    SHA256

    741859cf238c3a63bbb20ec6ed51e46451372bb221cfff438297d261d0561c2e

    SHA512

    d0a39bc41adc32f2f20b1a0ebad33bf48dfa6ed5cc1d8f92700cdd431db6c794c09d9f08bb5709b394acf54116c3a1e060e2abcc6b503e1501f8364d3eebcd52

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tcl_data\http1.0\pkgIndex.tcl

    Filesize

    746B

    MD5

    a387908e2fe9d84704c2e47a7f6e9bc5

    SHA1

    f3c08b3540033a54a59cb3b207e351303c9e29c6

    SHA256

    77265723959c092897c2449c5b7768ca72d0efcd8c505bddbb7a84f6aa401339

    SHA512

    7ac804d23e72e40e7b5532332b4a8d8446c6447bb79b4fe32402b13836079d348998ea0659802ab0065896d4f3c06f5866c6b0d90bf448f53e803d8c243bbc63

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tcl_data\init.tcl

    Filesize

    25KB

    MD5

    ffe4e47b5f4f96ec33fb31d52ef0b636

    SHA1

    3a625e493f8778277f65ffef1e0879fbec0e4d0d

    SHA256

    acacce15658dd7ce8f69b1e3d3a94770a22972a8e906eb3b61cd06f0ecd5db59

    SHA512

    dbbfd92ab6d95672f7882f3affb75f31749281c7450c29fcef58b5bdfd4f42b6d1d9f3a50ae0d3aa27e95d48918ed55cde5149751f892538bdd2dc39c618927e

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tcl_data\opt0.4\pkgIndex.tcl

    Filesize

    636B

    MD5

    93a0e83ab0a3545c206dc54e1206e368

    SHA1

    45fd706f83c43a7318358033e553d8c9b3210e4e

    SHA256

    68accee3eb8d0f134f9472c95425190ec08e7793df20a58d7d35325f42804695

    SHA512

    6e18c1bc98bd2d838570fcc68333aeee7fedc746547484fb09f3b7105bd198bd5201a0ce4e647d16655125fa764c676b7ba4bec9c992e37b438e199c708e643a

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tcl_data\package.tcl

    Filesize

    23KB

    MD5

    6a7b6485d3b290fc5d412ed1d62a170d

    SHA1

    50475e80e3969de279edfb1bf8d9c19694c36c0b

    SHA256

    b471cec9056b62d562020b14d69d4bd1f92dfe158afc8ba81c6341836211ca46

    SHA512

    36ced797ec18d4aa68fcce57f6eb510e78508d14646cf43ea2effb6f2cf88529d0cb5a4a136fb1252edbb95cba646bdcd19a8cd90a86b19fc28bb9611e2ccb73

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tcl_data\tclIndex

    Filesize

    7KB

    MD5

    42ec37eee38d6dd33a9fdecd7f1cd0aa

    SHA1

    6c8c93e5e5350d93f63f3f99d587ab8fb5aa496b

    SHA256

    577f042bbe640e2739606a1f76098abdb8bd1d1f31526402fb82b21091644f65

    SHA512

    37d61f27da79c494d225543828c9a29f1397c57506d609481036bfa2a336ec3110e6d10670edcf211a5714629eeb7e16dbf04a8388bc6bb420584edc06dc534d

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tcl_data\tm.tcl

    Filesize

    11KB

    MD5

    5746f2c35a7c434a78cc127f8d522e8c

    SHA1

    0b438de8ddc24b2d805a5db2c8c9432a52c6e53a

    SHA256

    f0cc13daca21fee538cca757aa09e88a969a85174eda26e61e573dda6c7ba413

    SHA512

    0a9038474b7bdb9469b7684b5b3867982a29bebbdf017d2dd21edcdd79dd3f67f4d99cdc0a11b3aa7b170b25644ead896489edb9a9a692ca654c0e7bed95ff42

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\button.tcl

    Filesize

    21KB

    MD5

    aeb53f7f1506cdfdfe557f54a76060ce

    SHA1

    ebb3666ee444b91a0d335da19c8333f73b71933b

    SHA256

    1f5dd8d81b26f16e772e92fd2a22accb785004d0ed3447e54f87005d9c6a07a5

    SHA512

    acdad4df988df6b2290fc9622e8eaccc31787fecdc98dcca38519cb762339d4d3fb344ae504b8c7918d6f414f4ad05d15e828df7f7f68f363bec54b11c9b7c43

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\entry.tcl

    Filesize

    18KB

    MD5

    ce819200e8cd36e4458b4cf47cfe9107

    SHA1

    d04357d9e236f83bb0d2f5db97e9ee228c34ec80

    SHA256

    6ac78f764434f932d37e8183aa6db5d04eb1848b774c92f7abc243ecb7d4a59b

    SHA512

    6576612c380ab04fa75724c72108a2f386d7f75c9db7a082445778f675e268d0594280a7644aa9ff3ac3d29026327b84a0990ee0c7a9f94bbac3ae63cf91e1de

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\icons.tcl

    Filesize

    10KB

    MD5

    995a0a8f7d0861c268aead5fc95a42ea

    SHA1

    21e121cf85e1c4984454237a646e58ec3c725a72

    SHA256

    1264940e62b9a37967925418e9d0dc0befd369e8c181b9bab3d1607e3cc14b85

    SHA512

    db7f5e0bc7d5c5f750e396e645f50a3e0cde61c9e687add0a40d0c1aa304ddfbceeb9f33ad201560c6e2b051f2eded07b41c43d00f14ee435cdeee73b56b93c7

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\listbox.tcl

    Filesize

    14KB

    MD5

    804e6dce549b2e541986c0ce9e75e2d1

    SHA1

    c44ee09421f127cf7f4070a9508f22709d06d043

    SHA256

    47c75f9f8348bf8f2c086c57b97b73741218100ca38d10b8abdf2051c95b9801

    SHA512

    029426c4f659848772e6bb1d8182eb03d2b43adf68fcfcc1ea1c2cc7c883685deda3fffda7e071912b9bda616ad7af2e1cb48ce359700c1a22e1e53e81cae34b

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\menu.tcl

    Filesize

    39KB

    MD5

    994cbd4038eeef9991f7d6086904166f

    SHA1

    24c05d55e80ddc36fd207eeb7c0fa262573d67d2

    SHA256

    ae4ee8400174c798337b9c60867cbc94f811b249ebe6dea21ec6f960bcf5f8cb

    SHA512

    d1a9c8c89025b305af52f1510b3d4d2a3c556847d345844367ff34c89b917f1646de81f08994ea1697f8f8526d9fd2602f9ac440b52097cab5951901dbbd6ebd

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\panedwindow.tcl

    Filesize

    5KB

    MD5

    286c01a1b12261bc47f5659fd1627abd

    SHA1

    4ca36795cab6dfe0bbba30bb88a2ab71a0896642

    SHA256

    aa4f87e41ac8297f51150f2a9f787607690d01793456b93f0939c54d394731f9

    SHA512

    d54d5a89b7408a9724a1ca1387f6473bdad33885194b2ec5a524c7853a297fd65ce2a57f571c51db718f6a00dce845de8cf5f51698f926e54ed72cdc81bcfe54

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\pkgIndex.tcl

    Filesize

    376B

    MD5

    62a8e4b5aeb35286e3b1d54973139a13

    SHA1

    1064e7e2765f9aea5d06ebdd932c689a877613d5

    SHA256

    6127926b94db2992ab450fc6cc2ec3d071f7bbc856656d0ae20cc3fd4036f547

    SHA512

    919e9a1c7d02cc886bb3901fd0d2966df0f5456f4646310d5762cd74c5b78f2b1b542b3be78e22dc9b070ea1bbf401dda7ecba223b1b1851feea028047bcbe8d

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\scale.tcl

    Filesize

    8KB

    MD5

    d45202d3d2d052d4c6bfe8d1322aab39

    SHA1

    8cdf184ac2e9299b2b2a107a64e9d1803aa298de

    SHA256

    0747a387fdd1b2c7135eceae7b392ed52e1d1ebf3ffa90febe886dbc0981eb74

    SHA512

    27b005f955bae00d15c4492e7bd3ebdc5ee3bf9c164c418198b4bd185709c8810aa6cf76cbcc07eeb4c1d20f8c76ef8df8b219563c18b88c94954c910bff575d

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\scrlbar.tcl

    Filesize

    12KB

    MD5

    5249cd1e97e48e3d6dec15e70b9d7792

    SHA1

    612e021ba25b5e512a0dfd48b6e77fc72894a6b9

    SHA256

    eec90404f702d3cfbfaec0f13bf5ed1ebeb736bee12d7e69770181a25401c61f

    SHA512

    e4e0ab15eb9b3118c30cd2ff8e5af87c549eaa9b640ffd809a928d96b4addefb9d25efdd1090fbd0019129cdf355bb2f277bc7194001ba1d2ed4a581110ceafc

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\spinbox.tcl

    Filesize

    16KB

    MD5

    eaa36f0aa69ae19ddbdd0448fbad9d4d

    SHA1

    eb0adb4f4d937bac2f17480adaf6f948262e754d

    SHA256

    747889c3086c917a34554a9dc495bc0c08a03fd3a5828353ed2a64b97f376835

    SHA512

    c8368f19ec6842ed67073b9fc9c9274107e643324cb23b28c54df63fb720f63b043281b30dbea053d08481b0442a87465f715a8aa0711b01ce83ff7b9f8a4f4c

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\text.tcl

    Filesize

    34KB

    MD5

    016613531555c4f30f670dab58f10b3d

    SHA1

    3afc8aa3e10950d79d1003b0810f2e0dc2135eb9

    SHA256

    f7ecc5ae6eb297c79aad5cfc200b29c4e72409641fa369c5cdbba30ae41e982a

    SHA512

    c5d071fc8cb68c5985e74ab7e90367e9261b291474689c37abd7f921716053e9d5e9446a45c5e91f3bb927589270e818e22e2d675acbe04e0627ecd5d532bc05

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\tk.tcl

    Filesize

    23KB

    MD5

    7e46d32c3e70dbf17663f57e17d18dfe

    SHA1

    394dd3cde6a7e41855917060f4388478a0a84668

    SHA256

    b7fd24177b17f67da2ca671f711309c65cf246be1fd0cf4f1ab8f3ea9ca2c3f1

    SHA512

    6125e9b6c213e48e4a7a47acc0be3b930ddd9aca2132817f1906a2453e0d0b8292e7b2090bab8712856d12d2cf4d119238f16fae0fb57dd66da4db8fb3d92b0d

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\ttk\button.tcl

    Filesize

    2KB

    MD5

    d4bf1af5dcdd85e3bd11dbf52eb2c146

    SHA1

    b1691578041319e671d31473a1dd404855d2038b

    SHA256

    e38a9d1f437981aa6bf0bdd074d57b769a4140c0f7d9aff51743fe4ecc6dfddf

    SHA512

    25834b4b231f4ff1a88eef67e1a102d1d0546ec3b0d46856258a6be6bbc4b381389c28e2eb60a01ff895df24d6450cd16ca449c71f82ba53ba438a4867a47dcd

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\ttk\cursors.tcl

    Filesize

    4KB

    MD5

    1a799fe3754307a5aade98c367e2f5d7

    SHA1

    c64be4b77f0d298610f4ee20fcebbaee3c8b5f22

    SHA256

    5b33f32b0139663347d6cf70a5a838f8e4554e0e881e97c8478b77733162ea73

    SHA512

    89f367f9a59730bcdfc5abde0e35a10b72a1f19c68a768ba4524c938ef5c5caf094c1bfa8fc74173f65201f6617544223c2143252a9f691ee9aaa7543315179f

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\ttk\fonts.tcl

    Filesize

    5KB

    MD5

    8514cf728a5782e457c50d7c61740ce5

    SHA1

    ede61c428d1865f10ae093d5c4bef29c0ec7e8ce

    SHA256

    6574067a91858506460ac44ddf8cf9270e81d67b2feff2a43b4d5f774568a5ec

    SHA512

    2e24f15887193ffb884ab6af9ecf619ef913e3f6c6dfb0fc980bfb59a57ffec56b68dd36935a2998fbc66d12ef40a58dc3b3f278ec0e21d84dffead6a80c4c96

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\ttk\menubutton.tcl

    Filesize

    6KB

    MD5

    aec91dd23de04196af5eb31e8bbd0946

    SHA1

    bdf5a5a42a147d7484e5a2966ea949fa68f52348

    SHA256

    0935fb97b6628f055baeb2e2babbf2a6c8905260e1107972b0e7a1df0752e180

    SHA512

    6ea4a2ec378e6cbabbf8ff20fb1cad0c68a90e5089f20d195fef2ee4ff9259bd3b622378e7203bd238402140f7eab7e316b8a8f9c4b6c0d3d3acbe81f0a25ea4

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\ttk\notebook.tcl

    Filesize

    5KB

    MD5

    39aec76c4e7b810873545c6a137accf3

    SHA1

    165372dccdd018d980aa2167094a4e0fa82b65f1

    SHA256

    b1210147f9daf3068de3d28d4b18c04ecfa8c8574e3e0ad275c1d0d75e9a99b2

    SHA512

    759436ca4462df6c217f1502d1350735004edd31472fdaa9860f3fd8fbc2f4978be2b5a57993c37b9dce4a8237840f50d620ba95c22900f658b29a2ac38a5218

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\ttk\progress.tcl

    Filesize

    1KB

    MD5

    dbf3bf0e8f04e9435e9561f740dfc700

    SHA1

    c7619a05a834efb901c57dcfec2c9e625f42428f

    SHA256

    697cc0a75ae31fe9c2d85fb25dca0afa5d0df9c523a2dfad2e4a36893be75fba

    SHA512

    d3b323dfb3eac4a78da2381405925c131a99c6806af6fd8041102162a44e48bf166982a4ae4aa142a14601736716f1a628d9587e292fa8e4842be984374cc192

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\ttk\scale.tcl

    Filesize

    2KB

    MD5

    f1c33cc2d47115bbecd2e7c2fcb631a7

    SHA1

    0123a961242ed8049b37c77c726db8dbd94c1023

    SHA256

    b909add0b87fa8ee08fd731041907212a8a0939d37d2ff9b2f600cd67dabd4bb

    SHA512

    96587a8c3555da1d810010c10c516ce5ccab071557a3c8d9bd65c647c7d4ad0e35cbed0788f1d72bafac8c84c7e2703fc747f70d9c95f720745a1fc4a701c544

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\ttk\scrollbar.tcl

    Filesize

    3KB

    MD5

    36ef078c823f7604f14d5d6d0a3a301b

    SHA1

    3e60bbdd52e327a77e6bb06c6fc7be0eb62780ff

    SHA256

    c223da92b7f5a7cb7f4f4da89cf94ecd472c6aad40bf2455bca7ab2409e459fc

    SHA512

    ee80d338411ced4ec38167ad0a60fb4a04e69a124f3ee5e21e081beeeccea342e55e713b3bf7a776f27f80eb6c2f5a49979cc338a4f2d44b1b8cfc641074f91f

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\ttk\ttk.tcl

    Filesize

    5KB

    MD5

    4a81a6219cfc1b056471d07624ee3dbd

    SHA1

    0a8e6b4a38cdba6a325d8668fce3442217392e8a

    SHA256

    685398e8db93aebbabfed795e91a42a87aa0e2a2cf23bfcffd70fea085a7ad5e

    SHA512

    5917febd222b1ad14ca871c11817d875d1ff019256eace148af49ba24be8f8fcf75debc40c6ba54368585c711dd9e056054bfd4133ea672f27d34a3d712bad6e

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tk_data\ttk\utils.tcl

    Filesize

    8KB

    MD5

    4070fde3f342eebf933e601593d9748c

    SHA1

    e31dfd6d1d29b4a040aa448a25f2161afdfb59ef

    SHA256

    b9b73e5bcd85c8fe00628332f0ab0c4a0ffbb59f7b4e9d6cdc92762a5bcd8d76

    SHA512

    43aaaeccc5819391be93d11c9b264592e429d0041716aa725efcf7c71ccb5c370ad1fea89acb3c294ce266895b8a398d24bad5aff74091c8349cd75ab4a4b02f

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\_tkinter.pyd

    Filesize

    66KB

    MD5

    653b8194cafca1902f451fdd2563b770

    SHA1

    701497c55588a9c2d63a3eb16651dd22d47140c2

    SHA256

    6edeccc758733e44edaeff20e403ede9a782335f7bd80975697547087c32c5cc

    SHA512

    671286359096a454338d1c371e576f24c6ae1eb6cbfbf7ddc0044dd2dc5d14f6aa0044c8112512839f6857eb70bcb98544b149b16392ca9ce09d207134644ccd

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\base_library.zip

    Filesize

    1.3MB

    MD5

    9d54fc30bb44a4bbf70c5870b746239f

    SHA1

    044df6dc160a78c74f0d118167ec37c789dcadfa

    SHA256

    e32714927efcb84db5affdc4c0237de7c8e9412182073d570855376aff0bfcbf

    SHA512

    964c83b9f98670736ec85ba8bb00088717334f1d5ff0dd34e71c9177a89c0c25d27d5a9992a278fbadfd832e9e8308294d3f78d41ae68b21edc63106a0421b39

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\libcrypto-3.dll

    Filesize

    5.0MB

    MD5

    123ad0908c76ccba4789c084f7a6b8d0

    SHA1

    86de58289c8200ed8c1fc51d5f00e38e32c1aad5

    SHA256

    4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

    SHA512

    80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\python313.dll

    Filesize

    5.8MB

    MD5

    501080884bed38cb8801a307c9d7b7b4

    SHA1

    881b250cc8f4fa4f75111ac557a4fde8e1e217af

    SHA256

    bf68cf819a1e865170430c10e91c18b427aef88db1da1742020443864aa2b749

    SHA512

    63d74a4871d1c72c2a79ae8a5d380070f9d2128c16949c3ad36c9862fcc4dab738137ed3d51caf0bc46b36655f8bd8a2d425d68200123415ee8d4de0e1cbebc9

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\select.pyd

    Filesize

    31KB

    MD5

    2663e22900ab5791c6687a264473ae1e

    SHA1

    d8db587b6c632200ae13be880cc824cdc8390df9

    SHA256

    baee284995b22d495fd12fa8378077e470978db1522c61bfb9af37fb827f33d1

    SHA512

    5f29ff4288b9db33976f5f79b9fd07c4900a560bb41fe98c93a33da7a36c0981ffd71f460e81e13e4f6a2debafa6d9284bc1a728734752ba5ad5fbd766659e80

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\tcl86t.dll

    Filesize

    1.8MB

    MD5

    3688caba94d9a1dc124df80aef41ac47

    SHA1

    66b314fc54b1d2475bfb655facacf8a8d6eacfed

    SHA256

    31560ca3b0eec014013405e9652b9261824232883749f0461d7d4e5f7faea3ab

    SHA512

    f3cd68e26f008b27370bd5222b6dafd8bb5f312a885db4e2f8f6502a719403263412f2aa7c8451b4ab7c59e674e3746710ce5a3c3c09f0cdb0266f82f226e9f4

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\tcl8\8.5\msgcat-1.6.1.tm

    Filesize

    34KB

    MD5

    e102bf017d302c494c1dbd449b040053

    SHA1

    58b16b222f881271e09f7775c46817bbc4bed81e

    SHA256

    adca186be560f2236265f538d4cb6df1171bed91192118796988bb9c08a4bc7c

    SHA512

    7001af784de0663bbf634842c12d833e447221a0fef05723373db3281d5bb9545c3c12103413137451730fba6207a1dc318b662aa4da6a72fe6944577c199da2

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\tk86t.dll

    Filesize

    1.5MB

    MD5

    d379810228b51c2571d9071eed3286b8

    SHA1

    a643cda1683168e27a209b397d0eea7bc14c5103

    SHA256

    34d402f3d6a237aac1165a010016ac032e0ae1a86dcfa03dda49ebfc0af40cad

    SHA512

    f195c4d38f3e1d6853efae68ef50a2d3e70fc0f3840aa9aa2c1cddaec6a311e60cd86fc84dcdf0d4febf4d0e94bb89238c1408c5781302bbfaeafc613e10084a

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\unicodedata.pyd

    Filesize

    694KB

    MD5

    c0b4c55ce3711af914b2015f707e4452

    SHA1

    f1c1e9f8a461cfee1199d2100f5c0796733518b6

    SHA256

    a67eec238162fde20ac24ca7df931792734aad0611be22d1b3a71bc15acf72f3

    SHA512

    fa6bd9223898ef0c54ca9a67b10207bfce152eadbaec4c91d4e951d0790f455066f5095ed739fa2452aea1420d154beb00bfa9e6e10b46bed687c5d0d7484900

  • C:\Users\Admin\AppData\Local\Temp\_MEI47722\zlib1.dll

    Filesize

    144KB

    MD5

    de2e3379deeacbe476b9ee8ddeac7ffe

    SHA1

    b112c267f5a6e3d06809896708d9ef9f7c118462

    SHA256

    94675de9234f00e75c73e4973f8fb49a272a1df8003337205cd1b15fb642a168

    SHA512

    0dbe2d131f41258c81e931bbc459051b26de488030a0ad20cb1d2d8ce8cce0a1ddd17a7049a2878368d7e535428bdc6c7886265f43be27fbc6aeed784080c93b

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_j4tqdxba.z0e.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\VelocityFix.exe

    Filesize

    39KB

    MD5

    53bfc0f8986b70724e4823f47241f6aa

    SHA1

    62e79122cea2f27e6f093fa484e5aa7795088ccc

    SHA256

    9286f18acfd1a8277f23da9a1079b571587c9bd5f28dbcff51845b933595426c

    SHA512

    5abbfbcc2e5cff491f4d213f4b83047f50e1de77d67631d510c7b540965c5f03a7611a0f1e79479d3a05a1e2f05fee6180b47ececc96c78f2e38ee5fa06430f2

  • C:\Users\Admin\AppData\Roaming\VelocitySupport.exe

    Filesize

    9.8MB

    MD5

    38c4223ac857cb56e3014d33c2062d05

    SHA1

    d32150012ab49dad1f1c7ad3b68b2e3c483f81f5

    SHA256

    cbcb51837d0ebd8fcae0dfa61ba516c103c34ca56a0aef400a2d14e9610cb43e

    SHA512

    f000154ce3e2fb06fc98d1cf8d867996c0fc2747aefc24a7d091a13443316396e24080aafffdb048de1b37ab360265afe7cee31ab07c7eb246e293b50c0edfa7

  • C:\Users\Admin\AppData\Roaming\VelocitySupportTool.exe

    Filesize

    250KB

    MD5

    1904b43012a89c4ec5b3c82c7f7e313e

    SHA1

    3b0eedb1ba0bff205b9d099dd355091229007d04

    SHA256

    1446224da9810c06e7336730dab3811c39c8d1d4b200c4e7d568b1440b432f61

    SHA512

    c37e6bba9776516201c28367dcb541ac108a1def13d72eaf311800710c854a794835b7b92075e3b5d61ff3c500e1446004479065e418e3cb0dfb41963123a06e

  • C:\Users\Admin\AppData\Roaming\VelocitySupportTools.exe

    Filesize

    103KB

    MD5

    3d47fe184f91ceb1bd0d4c213da5ebfa

    SHA1

    05ca3411a2b89f0c7884024f48b51e7574862992

    SHA256

    f0879c8017351b9cebbb546ea14f323ddb777cd97e435bb2de904ac28aa8525f

    SHA512

    1975ed404e30d674806a8209982cf5c81ec7b057178e5597195ca89d79406ddc1edcd25a3e6098e74ac5ce220e9a9975cb2bcbff4d2de8abfa7952c1902ff256

  • memory/100-49-0x0000000000040000-0x0000000000060000-memory.dmp

    Filesize

    128KB

  • memory/856-48-0x0000000000980000-0x0000000000990000-memory.dmp

    Filesize

    64KB

  • memory/1976-15-0x00007FF8DA960000-0x00007FF8DB421000-memory.dmp

    Filesize

    10.8MB

  • memory/1976-50-0x00007FF8DA960000-0x00007FF8DB421000-memory.dmp

    Filesize

    10.8MB

  • memory/1976-13-0x0000000000F50000-0x0000000000F94000-memory.dmp

    Filesize

    272KB

  • memory/1988-1094-0x00007FF8D4F80000-0x00007FF8D4FA9000-memory.dmp

    Filesize

    164KB

  • memory/2004-1-0x00000000008A0000-0x00000000012B4000-memory.dmp

    Filesize

    10.1MB

  • memory/2004-0-0x00007FF8DA963000-0x00007FF8DA965000-memory.dmp

    Filesize

    8KB

  • memory/5072-1053-0x000001CFC92C0000-0x000001CFC92E2000-memory.dmp

    Filesize

    136KB